• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

stack

  1. D

    Foundations of ARM64 Linux Debugging, Disassembling, and Reversing: Analyze Code, Understand Stack Memory Usage, and Reconstruct Original C/C++ Code w

    Gain a solid understanding of how Linux C and C++ compilers generate binary code. This book explains the reversing and binary analysis of ARM64 architecture now used by major Linux cloud providers and covers topics ranging from writing programs in assembly language, live debugging, and static...
  2. 1

    Exploits X.Org X Server 1.20.4 Local Stack Overflow

    X.Org X Server version 1.20.4 suffers from a local stack overflow vulnerability. View the full article
  3. 1

    Exploits ASX To MP3 Converter 3.1.3.7 Stack Overflow

    This Metasploit module exploits a stack buffer overflow in ASX to MP3 converter 3.1.3.7. By constructing a specially crafted ASX file and attempting to convert it to an MP3 file in the application, a buffer is overwritten, which allows for running shellcode. Tested on: Microsoft Windows 7...
  4. 1

    Exploits ASX To MP3 Converter 3.1.3.7 Local Stack Overflow

    ASX to MP3 Converter version 3.1.3.7 .asx local stack overflow exploit. View the full article
  5. 1

    Exploits Realtek Managed Switch Controller (RTL83xx) Stack Overflow

    Realtek Managed Switch Controller (RTL83xx) stack overflow proof of concept exploit. View the full article
  6. 1

    Exploits Realtek Managed Switch Controller RTL83xx Stack Overflow

    Realtek Managed Switch Controller RTL83xx suffers from a stack overflow vulnerability. Full exploit provided. View the full article
  7. 1

    Exploits ABC2MTEX 1.6.1 Stack Overflow

    ABC2MTEX version 1.6.1 suffers from a command-line stack overflow vulnerability. View the full article
  8. 1

    Exploits BACnet Stack 0.8.6 Denial Of Service

    BACnet Stack version 0.8.6 suffers from a denial of service vulnerability. View the full article
  9. 1

    Exploits Microsoft DirectWrite / AFDKO OpenType Stack Corruption

    Microsoft DirectWrite / AFDKO suffers from a stack corruption vulnerability in OpenType font handling while processing CFF blend DICT operator. View the full article
  10. 1

    Exploits Microsoft DirectWrite / AFDKO OpenType Stack Corruption Due To Negative nAxes

    Microsoft DirectWrite / AFDKO suffers from a stack corruption vulnerability in OpenType font handling due to negative nAxes. View the full article
  11. 1

    Exploits Microsoft DirectWrite / AFDKO OpenType Stack Corruption Due To Negative cubeStackDepth

    Microsoft DirectWrite / AFDKO suffers from a stack corruption vulnerability in OpenType font handling due to negative cubeStackDepth. View the full article
  12. 1

    Exploits Microsoft DirectWrite / AFDKO OpenType Stack Corruption Due To Out-Of-Bounds cubeStackDepth

    Microsoft DirectWrite / AFDKO suffers from a stack corruption vulnerability in OpenType font handling due to out-of-bounds cubeStackDepth. View the full article
  13. 1

    Exploits Microsoft DirectWrite / AFDKO OpenType blendArray Stack Corruption

    Microsoft DirectWrite / AFDKO suffers from a stack corruption vulnerability in OpenType font handling due to incorrect handling of blendArray. View the full article
  14. 1

    Exploits Microsoft DirectWrite / AFDKO OpenType Stack Underflow

    Microsoft DirectWrite / AFDKO suffers from an interpreter stack underflow in OpenType font handling due to missing CHKUFLOW. View the full article
  15. 1

    Exploits Thunderbird libical Stack Buffer Overflow

    A stack-based buffer overflow has been identified in the Thunderbird email client. The issue is present in the libical implementation, which was forked from upstream libical version 0.47. The issue can be triggered remotely, when an attacker sends an specially crafted calendar attachment and...
  16. 1

    Exploits Dlink DCS-1130 Command Injection / CSRF / Stack Overflow

    Dlink DCS-1130 suffers from command injection, cross site request forgery, stack overflow, and various other vulnerabilities. View the full article
  17. 1

    Exploits Cisco RV130W 1.0.3.44 Remote Stack Overflow

    Cisco RV130W version 1.0.3.44 suffers from a remote stack overflow vulnerability. View the full article
  18. 1

    Exploits NUUO NVRMini 2 3.9.1 Stack Overflow

    NUUO NVRMini 2 version 3.9.1 suffers from an sscanf stack overflow vulnerability. View the full article
  19. 1

    Exploits JavaScriptCore LICM Uninitialized Stack Variable

    JavaScriptCore loop-invariant code motion (LICM) in DFG JIT leaves a stack variable uninitialized. View the full article
  20. 1

    Exploits Huawei eSpace 1.1.11.103 Unicode Stack Buffer Overflow

    Huawei eSpace Meeting cenwpoll.dll unicode stack buffer overflow exploit with SEH overwrite. View the full article
Back
Top