This exploit takes advantage of a buffer overflow vulnerability in RealPlayer's .smil file parser. It allows an attacker to execute arbitrary code on a target system.
This exploit targets a buffer overflow vulnerability in RM Downloader 3.0.0.9. By sending a specially crafted .RAM file, an attacker can overflow a buffer and potentially execute arbitrary code on the target system.
This vulnerability allows an attacker to execute arbitrary commands on the target system. It occurs when user-supplied input is not properly validated and is directly passed to a system command without any sanitization or filtering. The attacker can manipulate the input to include malicious commands, which are then executed by the system.
This exploit allows an attacker to dump the database of Forum-Aztek v4.0 by sending a specially crafted request to the vulnerable server. It retrieves the admin login credentials and other sensitive information from the database.
Exploit allows remote attackers to gain root access on Linux and Windows systems running RealServer.
This exploit allows an attacker to change user options in MiniTwitter v0.2-Beta CMS.
This exploit is for Mercury Audio Player 1.21 (.b4s) which allows local stack overflow. The exploit code was created by His0k4. It has been tested on Windows XP Pro SP3 (EN). The vulnerability allows an attacker to execute arbitrary code by overflowing the stack. The exploit uses a jump instruction to the address 0x7C868667 in kernel32.dll. It also includes some nops (no-operation instructions) for padding.
This exploit allows an attacker to gain administrative access to a phpBB forum by modifying the cookie file. By changing the 'user id' value in the cookie to the admin's 'user id', the attacker can impersonate the admin and gain full control over the forum.
This exploit allows an attacker to inject SQL queries into the elitius script, potentially gaining unauthorized access to the database.
This exploit targets the Symantec Fax Viewer Control v10 (DCCFAXVW.DLL) and is specifically designed for Internet Explorer 7. It allows an attacker to remotely overflow the buffer, potentially leading to code execution on the targeted system.