This exploit allows remote attackers to execute arbitrary code on vulnerable installations of HP OpenView NNM. The vulnerability is caused by a boundary error in the 'MaxAge' parameter of the 'getnnmdata.exe' CGI script. By sending a specially crafted HTTP request, an attacker can exploit this vulnerability to execute arbitrary code on the target system.
This exploit allows an attacker to perform blind SQL injection in the Joomla Component (com_seyret) application. The exploit script is written in Perl and uses LWP::UserAgent and Getopt::Long modules.
This exploit targets RM Downloader 3.1.3.3.2010.06.26 (Evaluation) software on Windows 7 Ultimate x64 ENG. It bypasses ASLR and DEP using ROP gadgets from RDfilter03.dll. The exploit is based on the work of MadjiX and corelanc0d3r.
Remote 'estara softphone' exploit that targets executable version 3.0.1.2. The exploit utilizes encoded bindshell on tcp/5060. It takes advantage of the fact that many users forward both tcp and udp port 5060 to their machine for sip stuff without considering the difference between the two.
There is an SQL Injection vulnerability in the CubeCart PHP Shopping cart, this vulnerability may be exploited by 'HTTP POST'ing malicious data to the index.php script of CubeCart. As an example, exploitation may result in leak of sensitive information or injection of malicious code into the shopping cart's web page.
An input validation flaw exists within 'settings.php' of Magic News Plus which can lead to the changing of the administrative password. The flaw occurs in line 108 of 426 in the code. The exploit involves sending specific parameters to the application to change the password.
This exploit takes advantage of a stack buffer overflow vulnerability in Kingsoft Writer 2010. By sending a specially crafted .C file, an attacker can trigger a stack buffer overflow, potentially leading to remote code execution.
This exploit takes advantage of a stack/SEH overflow vulnerability in WinProxy 6.0 R1c. It allows an attacker to execute arbitrary code on the target system.
This exploit takes advantage of a SQL injection vulnerability in the image_display_details1.php script of the 2daybiz Photo Sharing Script. It allows an attacker to execute arbitrary SQL queries and potentially gain unauthorized access to the database.
The vulnerability allows attackers to inject SQL queries into the 'cate' parameter of the searchproject.php script, leading to potential unauthorized access and manipulation of the database.