The .hfz files in Pinnacle Studio 12 can be used to overwrite files on the target system or place scripts in Startup folders by directory traversal attacks. The InstallHFX.exe decompresses them with no prompts.
This is a proof-of-concept exploit for a remote buffer overflow vulnerability in Ethereal 3G-A11. The exploit is designed to crash the vulnerable software by sending a specially crafted packet. The vulnerability allows an attacker to execute arbitrary code on the target system. The exact details of the vulnerability and the associated CVE are not provided in this code snippet.
This is a proof of concept (POC) exploit for a Denial of Service (DoS) vulnerability in the ipsec-tools racoon service. The vulnerability allows an attacker to send a specially crafted packet to the service, causing it to crash or become unresponsive. The exploit takes advantage of a flaw in the handling of IKE fragmentation payloads, which can be used to exhaust system resources and disrupt the normal operation of the service. This POC has been tested on ipsec-tools-0.7.1.
This exploit targets the Java SE Runtime Environment version 6 Update 13. It allows for remote .jnlp execution and stack-based buffer overflow. The exploit takes advantage of unsafe registry keys and objects with unsafe properties. It has been tested on Windows XP Professional SP3 with Internet Explorer 8.
This exploit targets the user registration and user options changer functionality in the Bigace CMS stable release 2.5. It allows an attacker to inject malicious SQL queries and manipulate the database, potentially gaining unauthorized access or causing data corruption.
This exploit utilizes SQL injection to create a new user with admin privileges on the paNews software system.
This exploit targets the MPLAB IDE 8.30 (.mcp) file format and performs a universal SEH overwrite. It allows an attacker to execute arbitrary code in the context of the application.
The vulnerability allows an attacker to inject malicious SQL queries into the 'AlbumID' parameter, which is not properly sanitized. This can lead to unauthorized access to the database and potential data leakage.
This is an exploit for a local buffer overflow vulnerability in Mini-stream RM-MP3 Converter version 3.0.0.7. The vulnerability allows an attacker to execute arbitrary code on the target system.
This exploit takes advantage of a buffer overflow vulnerability in Mini-stream ASX to MP3 Converter 3.0.0.7. By providing a specially crafted .ASX file with a long HREF value, an attacker can overflow the buffer and execute arbitrary code. This exploit has been tested on Windows XP SP2.