!-- The problem is in wkimgsrv.dll module shipped with many MS Offiice Suite (tested on MS OF 2003,MS OF 2007) Actually,this is not the case of buffer overflow attack,just a exploit of insecure method WKsPictureInterface. Setting this point to any wh
PRODUCT: GroupWise 7.0 OS: Windows Xp The scheme mailto is vulnerable if one takes as default mail client to GroupWise, the fault is to implement the scheme followed by an extensive argument and this causes the buffer overflow. This brings the conse
// ms08-25-exploit #1 // This exploit takes advantage of one of the vulnerabilities // patched in the Microsoft Security bulletin MS08-25 // http://www.microsoft.com/technet/security/bulletin/ms08-025.mspx // ---------------------------------------
/* Epibite // bite since 1442 * pown meme ta mamie */ /* Advisory from Luigi Auriemma * CVE-2007-6682 / format string in VideoLAN VLC 0.8.6d * * Description : * Format string vulnerability in the httpd_FileCallBack * function (network/httpd.c) in Vi
Insecure Methods in HP Update Software. Remote: Yes Execute code remotely is possible using methods ExecuteAsync and Execute :-) If a user visits the malicious page the attacker can execute code. Coded by callAX Proof of Concept ---------------- HTM
g// Exploit.cpp : Defines the entry point for the console application. // #include stdafx.h /*********************************************************************** DivX Player =6.7 srt subtitle parsing exploit Coded by lhoang8500@gmail.com Tested o
Vulnerability class : Arbitrary file overwrite Discovery date : 21 April 2008 Remote : Yes Credits : J. Bachmann B. Mariani from ilion Research Labs Vulnerable : Zune software: EncProfile2 Class An arbitrary file overwrite as been discovered in an Ac
Exploitable issue in various Adobe products c0ntex (c0ntexb@gmail.com) Scott Laurie February 2008 Vulnerable applications, tested: Adobe Photoshop Album Starter Adobe After Effects CS3 Adobe Photoshop CS3 Not Vulnerable applications, tested: Adobe Re
/===Subedit Player build 4066 subtitle BoF vulnerability=========| | | SubEdit Player is a very popular player and subtitles | editor in Poland. It does not perform any boundery checks | on supplied subtitles. This causes buffer overrun and | throwin
#!/usr/bin/perl# [ OpenInvoice 0.9 Arbitrary Change User Password Exploit ]# Discovered Coded By t0pP8uZz# Discovered On: 18 April 2008# Vendor has not been notified!# see exploit for more details..# Greetz: milw0rm.com, h4ck-y0u.org, CipherCrew!use
#!/usr/bin/python ####################################################################### # DivX 6.6 SRT SEH overwrite PoC # Tested on XP SP2 # Coded by Mati Aharoni, aka muts and Chris Hadnagy, aka loganWHD # muts..at..offensive-security...dot..com
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/projects