The exploit takes advantage of a buffer overflow vulnerability in Adrenalin Player. By sending a specially crafted .asx file, an attacker can overwrite the Structured Exception Handler (SEH) and gain control of the program execution flow. This exploit has been tested on Adrenalin Player version 2.2.5.3 running on Windows XP SP3.
Restricted access to this script isn't properly realized (Don't require authentication), so an attacker might be able to upload arbitrary files containing malicious PHP code due to uploaded file extension isn't properly checked.
This exploit takes advantage of a buffer overflow vulnerability in Adrenalin Player. By sending a specially crafted payload, an attacker can overwrite the Structured Exception Handler (SEH) to execute arbitrary code. The exploit uses a combination of NOP padding, a short jump, and a POP POP RETN sequence to achieve code execution. Additionally, it includes a shellcode payload to create a bind shell on port 4444. The exploit has been tested on Windows XP SP3.
RuubikCMS v1.1.1 is vulnerable to Stored XSS. The vulnerability exists in the 'name' parameter of the POST request to '/ruubikcms/ruubikcms/cms/index.php'. Attackers can exploit this vulnerability to execute arbitrary HTML and script code in a user's browser session.
Variable $dir not sanitized.When register_globals=on an attacker can exploit this vulnerability with a simple php injection script.# http://www.site.com/[path]/client.php?dir=[Evil_Script]
By setting to a memory address the first argument and the second one to 'false' you can write a NULL byte inside an arbitrary memory region. By setting to a memory address the first argument and the second one to 'true' you can write a x08 byte inside an arbitrary memory region.
This exploit allows an attacker to send a malicious packet to the Xfire client on UDP port 25777, causing it to terminate. It has been tested on Windows XP Service Pack 1 and 2. The successful exploitation of this vulnerability results in the client displaying an error message and crashing.
The Cdsagenda 4.2.9 application is vulnerable to remote file inclusion. The vulnerability allows an attacker to include a remote file by manipulating the 'AGE' parameter in the 'SendAlertEmail.php' page. This can be exploited to execute malicious code.
A remotely exploitable buffer overflow exists in MSN Messenger and Windows Messenger. This vulnerability is related to parsing of Portable Network Graphics (PNG) image header data. Successful exploitation will result in execution of arbitrary code in the context of the vulnerable client user.
The vulnerabilities in PHP4 and PHP5 allow remote attackers to carry out directory traversal attacks to disclose arbitrary files and upload files to arbitrary locations. This can be exploited by passing user-supplied data without proper sanitization.