This exploit takes advantage of a boundary condition error in Corel VideoStudio Pro X3. By inserting a specially crafted media file into the timeline, an attacker can cause an access violation, leading to potential code execution.
This exploit takes advantage of a SEH (Structured Exception Handling) vulnerability in the batchaudio_setup.exe software. It uses a combination of junk data, a non-SEH overwrite (nseh), and a SEH overwrite (seh) to gain control of the program's execution flow. The exploit then executes a payload that opens the Windows calculator (calc.exe). The exploit has been tested on Windows XP SP2.
A vulnerability exists in the Netware CIFS.NLM driver which allows an attacker to trigger a kernel stack overflow by sending a specific 'Sessions Setup AndX' query. Successful exploitation of this issue will result in remote code execution with kernel privileges. Failed attempts may result in a remote denial of service.
This is a buffer overflow exploit in the Winplot software. The vulnerability allows an attacker to overwrite the stack buffer, potentially leading to remote code execution.
SAS Hotel Management System is vulnerable to SQL Injection. This vulnerability allows an attacker to manipulate the database by injecting malicious SQL queries. The exploit can be used to extract sensitive information, modify or delete data, or even gain unauthorized access to the system.
PHP Online Jobs is an Extensive and Powerful script written in PHP to launch your own jobs portal with quality features (upload resume, resume search, pound sterling payments and much much more). It has a very high potential to generate very heavy online revenues for you. Script is built with a focus on increases ease of users and profits of webmasters.
The Digital Interchange Document library allows you to easily and seamlessly store your documents online! The administration area is a secured area with an intuitive interface that will let you manage all of your documents from any location with an internet connection. By storing your documents in folders you setup in the Document Library, you will be able to quickly and easily organize and access the information you need most.
The vulnerability allows an attacker to disclose local files on the target system by exploiting a flaw in the 'download.php' script of Yamamah Photo Gallery version 1.00. By manipulating the 'download' parameter, an attacker can traverse the file system and access sensitive files.
The script is vulnerable to SQL injection because it fails to properly sanitize user-supplied input to the 'uid' parameter in the 'managechat.php' script. An attacker can exploit this vulnerability to execute arbitrary SQL code on the underlying database. Additionally, the script is also vulnerable to arbitrary file upload, allowing an attacker to upload malicious files to the server. This vulnerability was first discovered and reported by DNX. The password stored in the database is encoded with sha1.
VU Mass Mailer sends mass mail smartly. There is a time interval that separates each email from being treated as mass mailing. Emails are stor