This Metasploit module exploits a stack buffer overflow in Microsoft's Visual Studio 6.0. When passing a specially crafted string to the Mask parameter of the Msmask32.ocx ActiveX Control, an attacker may be able to execute arbitrary code.
def095f5fae66e555774c80c31922aee92bbe086dec4cbf1548a0683a892e8c5
This Metasploit module exploits a stack overflow in Microsoft's Visual Studio 6.0. When passing a specially crafted string to the Mask parameter of the Msmask32.ocx ActiveX Control, an attacker may be able to execute arbitrary code.
56b52c8f83d0a22f5e67d717396bd5fe41cbe970d924fc937c14e7521ff8ee80
MP3 Studio version 1.0 local buffer overflow exploit that creates a malicious .mpf file.
d1964b25a92459ffadebc2b3cd94172c9e573cf59a13c38c2591b6a92d6e99a6
eXeScope version 6.50 local buffer overflow exploit that creates a malicious .exe file.
49883f40b03f7ea39c3671422807dfa50b1883ead4aacc1b56752b23f0009599
14 bytes small win32 PEB!NtGlobalFlags shellcode.
bd6da0384db9681081f499006fe5902116a197a8ea926b38438711cc2ca8fb4f
Getleft version 1.2 proof of concept buffer overflow exploit that causes a denial of service condition.
5519139bcfb084e1b5afe1d514b6af3c2bb23bae05e899b6954e99cec7a4bfc2
67 byte Win32 PEB Kernel32.dll ImageBase Finger Alphanumeric shellcode.
7edd77337a4cddaae3c77b3778d9de498c100a2f5dbfbb94d1a1bd7484c8ec2b
49 byte Win32 PEB Kernel32.dll ImageBase Finger shellcode.
23ae18945ff456479ef4e6344f82cc9a281c5472da34397d346f64073ff308d6
Acoustica Mixcraft versions 4.2 Build 98 and below mx4 file local buffer overflow exploit.
43b6c437b76203c406a76bf1208c80f1560e902d45286eea3f3997178aafd87f
Microsoft Visual Studio Active-X remote buffer overflow exploit that leverages Msmask32.ocx.
807bbc098da295675fcf16e2045be01698e849fcabdc6fe4f7c158d6cb3c3e6e
IntelliTamper version 2.07 server header remote code execution exploit.
b34305238b562e14d5c2bf1bc2ccb0dbfeece31ca10501ae2b18ca248200b80c
Microsoft Visual Basic version 6.0 VBP_Open OLE local code execution exploit.
2dde94986eb1a6eec380df5aae50265343027d4cff29eb3748ff4619878d5d70