exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocalwindows
https://www.exploit-db.com/exploits/16631
This Metasploit module exploits a stack buffer overflow in HTML Help Workshop 4.74 by crafting a malicious .hhp project file with an oversized 'Index file' field, leading to arbitrary code execution via an egghunter technique.
Classification
Working Poc 100%
Target:
HTML Help Workshop 4.74
No auth needed
Prerequisites:
Victim must open the malicious .hhp file
exploitdb
WORKING POC
VERIFIED
by Encrypt3d.M!nd · pythonlocalwindows
https://www.exploit-db.com/exploits/10321
This exploit targets a buffer overflow vulnerability in HTML Help Workshop 4.74 by crafting a malicious .hhp project file. It uses an egg-hunting technique to locate and execute shellcode, which spawns a calculator as a proof-of-concept payload.
Classification
Working Poc 95%
Target:
HTML Help Workshop 4.74
No auth needed
Prerequisites:
Victim must open the malicious .hhp file
exploitdb
WORKING POC
VERIFIED
by SkD · perllocalwindows
https://www.exploit-db.com/exploits/7727
This is a functional exploit for a buffer overflow vulnerability in Microsoft HTML Workshop <= 4.74. It uses a custom shellhunter technique to locate and execute shellcode reliably across different Windows versions.
Classification
Working Poc 95%
Target:
Microsoft HTML Workshop <= 4.74
No auth needed
Prerequisites:
Victim must open a maliciously crafted .hhp file
exploitdb
WORKING POC
VERIFIED
by k3xji · clocalwindows
https://www.exploit-db.com/exploits/1490
This exploit demonstrates a buffer overflow vulnerability in Microsoft HTML Help Workshop by crafting a malicious .hhp file with an overflow in the 'Compiled file' field, leading to arbitrary code execution when the file is opened.
Classification
Working Poc 95%
Target:
Microsoft HTML Help Workshop
No auth needed
Prerequisites:
Victim must open the malicious .hhp file with Microsoft HTML Help Workshop
exploitdb
WORKING POC
VERIFIED
by bratax · clocalwindows
https://www.exploit-db.com/exploits/1470
This exploit leverages a buffer overflow in Microsoft HTML Help Workshop by crafting a malicious .hhp file with an oversized 'Contents file' field, overwriting EIP with a 'jmp esp' address and executing a bind shell payload.
Classification
Working Poc 100%
Target:
Microsoft HTML Help Workshop
No auth needed
Prerequisites:
Victim must open the malicious .hhp file in Microsoft HTML Help Workshop
exploitdb
WORKING POC
cpplocalwindows
https://www.exploit-db.com/exploits/1495
This exploit leverages a stack overflow vulnerability in Windows HTML Help Workshop by crafting a malicious .hhp file with an oversized 'Index File' field. The payload includes a NOP sled and shellcode to achieve arbitrary code execution.
Classification
Working Poc 95%
Target:
Windows HTML Help Workshop (version not specified, tested on WinXP SP2)
No auth needed
Prerequisites:
Victim must open the malicious .hhp file in HTML Help Workshop
exploitdb
WORKING POC
doswindows
https://www.exploit-db.com/exploits/1488
This exploit targets CVE-2009-0133, a buffer overflow vulnerability in Microsoft Office Word. The PoC uses a maliciously crafted .rtf file with an overly long 'Compatibility' field to trigger a stack-based buffer overflow, potentially leading to arbitrary code execution.
Classification
Working Poc 90%
Target:
Microsoft Office Word (versions prior to the patch for CVE-2009-0133)
No auth needed
Prerequisites:
Victim must open the malicious RTF file in a vulnerable version of Microsoft Word