This Metasploit module exploits a stack buffer overflow in Boxoft WAV to MP3 Converter versions 1.0 and 1.1. By constructing a specially crafted WAV file and attempting to convert it to an MP3 file in the application, a buffer is overwritten, which allows for running shellcode.
7ce78a44af7a5f6b6d50bbd053541d443704b24c121b5a53d4540734c686a507
VeryPDF Image2PDF Converter SEH buffer oevrflow exploit that spawns messagebox shellcode.
fb0eb094b5e573fada445410e8039241a3a11cfe31027910642ed1bad8b24dda
VeryPDF HTML Converter version 2.0 SEH/ToLower() bypass buffer overflow exploit.
e86db11239fffa2d87876c39a853d9f11bc0b17d24e60ab24af1de7f2512c85d
AutoCAD DWG/DXF to PDF Converter version 2.2 suffers from a buffer overflow vulnerability.
f81c62210b1b8a813c20a05f429363519ef706bff3abe4245f3d48df6f604534
PFTP Server version 8.0f SEH bypass buffer overflow exploit.
374b7b3828422456d3ecce6a3d6fb852605794c39adce138ddee7edb0248df1d
Boxoft WAV to MP3 Converter SEH bypass buffer overflow exploit.
7761b6a1ed9cade7d306f6578b5bfdb01c1cb8a8b62936c2ada2e08f4e708cec