Dup Scout Enterprise version 10.0.18 suffers from a remote buffer overflow vulnerability.
0d9e00f68aff1390cbf778030b3bad1d0909dfe43398e6e3d52770cce05d2f4b
Fortinet FortiClient version 5.2.3 (Windows 10 x64 Creators) suffers from a local privilege escalation vulnerability.
934166d5f0ea9a90ecef2a0f8624ac2092b8268d038d754b2e6e97dcac6042ca
This Metasploit module exploits a stack buffer overflow in Dup Scout Enterprise version 10.0.18. The buffer overflow exists via the web interface during login. This gives NT AUTHORITY\SYSTEM access.
67efc4aaa88613a74e677907f3bedd53194705d0e358c6a390abcbecf955e8fd
Dup Scout Enterprise version 10.0.18 'Login' buffer overflow exploit.
bfcefabba134afcd83732d02efecadeec8b935e44a63f63793cf3af30cd26ba4
Disk Pulse Enterprise version 10.0.12 GET buffer overflow SEH exploit.
2ec52d52a2d7920391601670f498eac12a8d4246552fdb38dcfc0a43511bb00a
Internet Explorer 8 fixed col span ID full ASLR, DEP, and EMET 5.0 bypass exploit that leverages the issue outlined in MS12-037.
876b8cd7e67c79c669947885b557203c13c38a1e58f07a2be3d86ba1ee061f95
Symantec Endpoint Protection versions 11.x and 12.x suffer from a kernel pool overflow vulnerability.
4336ac24272f9e03af411eafef0734ba3a8c0d939a93fed5265bff19cf5612fe
Internet Explorer 8 fixed col span ID full ASLR, DEP, and EMET 4.1.x bypass exploit.
ff19b9e3a42f5ae1d11f835cd5bb7036e91123434822a6dd207b16ef9d8ff9ef
Novell Client 2 SP3 suffers from a privilege escalation vulnerability.
90372d883442b6991b9af375b8d05bbaa5c31c066b8a21018779b94badc3881d
Internet Explorer 8 heap overflow exploit with ASLR and DEP bypass that spawns a bind shell on port 4444.
b570320daa4262220db4c1f58d4fed98a833192b202f58d2311bc5bdd9a38d0f
Novell Client version 4.91 SP3/4 privilege escalation exploit for Win2K3 and WinXP.
4ec2f8f29147c1ce17f8421e5cc26463ec7e91ac339c0dc03fbab345bff2b6fd
This Metasploit module exploits a stack buffer overflow in Wireshark versions 1.4.4 and below by sending an malicious packet.
511f64f5e1e6f3db59de9b6a6c43ae3aaf55d251853f709490e4c55d464cb353
This Metasploit module exploits a stack buffer overflow in Wireshark versions 1.4.4 and below. When opening a malicious .pcap file in Wireshark, a stack buffer overflow occurs, resulting in arbitrary code execution.
acc61f711bf3fc96f88a363a4b7cccba3e7feabb4a6da3f77f3cf131516df027
This Metasploit module exploits a stack-based buffer overflow on DVD X Player 5.5 Pro and Standard. By supplying a long string of data in a plf file (playlist), the MediaPlayerCtrl.dll component will attempt to extract a filename out of the string, and then copy it on the stack without any proper bounds checking, which causes a buffer overflow, and results arbitrary code execution under the context of the user. This Metasploit module has been designed to target common Windows systems such as: Windows XP SP2/SP3, Windows Vista, and Windows 7.
348b94a602e053d653e9e822631e9a0911f02f12bdc2763f325cc1727f13dace
DVD X Player version 5.5.0 Pro / Standard buffer overflow universal exploit with DEP and ASLR bypass.
ff2c06654d55aa326f4f44666c7cce681905e38f27f77a5a4d581e28372935c0
Whitepaper called Linux exploit development part 4 - ASCII armor bypass + return-to-plt.
c0d19856fa4074f5a2b533a159aa2d90413ff00bcab1ec6123d510643abeef1a
This whitepaper is the Linux Exploit Writing Tutorial Part 3 - ret2libc. This is revision 2 of this paper.
bba6500bcedde54e96b63b399e68d97f98a6124e0c07cd34ae5930b438c288a6
This Metasploit module exploits a stack buffer overflow in Wireshark versions 1.4.4 and below. When opening a malicious .pcap file in Wireshark, a stack buffer overflow occurs, resulting in arbitrary code execution. This exploit bypasses DEP and ASLR and works on XP, Vista & Windows 7.
8f106e8404d0b3f4126f6f01b343c0f70315188f1d02c21066e67ef03f0f07b9
Wireshark versions 1.4.1 through 1.4.4 SEH overflow exploit that spawns calc.exe.
1190bfbcea843e5145744418548830b04cb799c34c387f3a3edb3bd512300dbd
Whitepaper called Linux Exploit Development Part 2 (rev 2) - Real app demo. It demonstrates the techniques discussed in part two of the Linux Exploit Writing Tutorial Part 2.
9d8d715b6f316e9f63f14b859b152b87374e7b5a3a88cdeb44ec2675b622e5eb
This whitepaper is the Linux Exploit Writing Tutorial Part 3 - ret2libc.
0c997f453113bbffd85c2e423fdd85827bfcc2d611e79f025ec56ad4c662c590
This whitepaper is the Linux Exploit Writing Tutorial Part 2 - Stack Overflow ASLR bypass using ret2reg instruction from vulnerable_1.
4c2b149d7ccca25f1acf14efcd2470501e9773535e368a20bb006619476ff363
This whitepaper is the Linux Exploit Writing Tutorial Part 1 - Stack Overflows.
6488f181fc61e642b59d341915ac78c3f149e0c47321468db7268d3f0857152f
Elecard AVC_HD/MPEG Player version 5.7 buffer overflow exploit that creates a malicious .m3u file.
151cb9683bc748c89729e4a7d9ff9899705e86242415ca9adc024ad7ffc0970c
MoviePlay version 4.82 buffer overflow exploit that creates a malicious .lst file.
160736efc827c3b534e500008d7861ea6c2b13e2df72a9a601815fc17cbc839d