This exploit allows an attacker to perform unauthorized actions on behalf of a user by tricking them into clicking a specially crafted link or visiting a malicious website. In this case, the exploit targets the Cpanel 11.X Edit E-mail feature.
This exploit allows an attacker to escalate their privileges on a Windows system using a 0day vulnerability in the Task Scheduler. The exploit takes advantage of a flaw in the scheduler's handling of certain scripts, allowing the attacker to execute arbitrary code with elevated privileges. The vulnerability has not been assigned a CVE identifier.
Kontakt Player 4 suffers from a buffer overflow vulnerability when parsing ".nki" files. The application fails in boundary checking of the user input resulting in a crash. The attacker can leverage from this scenario to execute arbitrary code on the affected system. Failed attempts will result in denial of service.
This is a buffer overflow exploit for MP3-Nator software. It bypasses SEH and DEP protections.
A Buffer Overflow Vulnerability exists in Microsoft Visual Studio 6.0 (with latest Service Pack 6) and Microsoft Development Environment 6.0 (SP6) (Microsoft Visual InterDev 6.0) due to a malformed .dbp file. This vulnerability can be exploited by an attacker to execute arbitrary code or cause a denial of service.
This exploit targets the 'Boutique' module in the 'Nuked Klan' content management system. It allows an attacker to manipulate the 'catid' parameter in the 'op=cat' action of the 'index.php?file=Boutique' URL, potentially leading to unauthorized access or other malicious activities.
This exploit allows an attacker to download the NewsPad database file (NewsPad.mdb) from a vulnerable website. This vulnerability can be used to extract sensitive information from the database.
This exploit targets a buffer overflow vulnerability in Foxit Reader 4.1.1. It allows an attacker to execute arbitrary code on the target system.
There is a trivial buffer overflow in the web proxy (default port 3128). Sending GET http://host.com/AAAAAAAAAA...(~4100bytes) will cause an access violation. Other services not tested, but they can be vulnerable too.
This is a buffer overflow exploit for Free WMA MP3 Converter version 1.1. The exploit code is designed to execute arbitrary code with the privileges of the application. The code is already injected with an egg to facilitate exploitation.