This is an exploit for SyncBack Freeware V3.2.20.0. It utilizes a SEH vulnerability.
This PoC will crash the Ethereal due to a buffer overflow in the SLIMP3 dissector. The vulnerability was discovered by the vendor and coded by Sowhat. It affects versions 0.9.1 to 0.10.12 of Ethereal.
This is a format string exploit for Vertias Netbackup on Win32 systems. The exploit code overwrites either the PEBFastlock or SEH depending on the target system. The exploit is designed for Windows 2000 and Windows XP pre-SP2 for the PEBFastlock overwrite, and Windows XP SP2 for the SEH overwrite. The exploit code is available at the website digitalmunition.com.
The Joomla Component com_crowdsource is vulnerable to SQL Injection. An attacker can exploit this vulnerability to execute arbitrary SQL commands on the underlying database.
This is an exploit for a format string vulnerability in VERITAS NetBackup on Linux/x86. The exploit allows for remote code execution with root privileges. The vulnerability was discovered by kf_lists[at]digitalmunition[dot]com and the exploit was developed by johnh[at]digitalmunition[dot]com. The exploit works by sending a specially crafted request to the target server, triggering the format string vulnerability and executing the provided shellcode.
This exploit allows an attacker to execute remote commands on a system running e107 version 0.617. The attacker can inject SQL queries and execute arbitrary code on the target system.
The Joomla Custom PHP Pages Component is affected by a Local File Inclusion (LFI) vulnerability. The vulnerability allows an attacker to include arbitrary files from the server, potentially leading to remote code execution. The vulnerability exists in the 'php.php' file of the component, where user-supplied input is used without proper sanitization.
Adobe Shockwave Player version 11.5.6.606 and earlier suffers from memory consumption/corruption and buffer overflow vulnerabilities that can lead to denial of service and arbitrary code execution. The vulnerabilities occur when processing .dir files, causing a crash and memory register overwrite.
An unauthenticated remote code execution vulnerability exists in the way that the Windows Mail Client handles certain email messages. This vulnerability allows an attacker to execute arbitrary code on the target system.
The Family Connections version 2.2.3 is affected by multiple vulnerabilities, including multiple blind SQL injection and multiple SNMP injection. The blind SQL injection vulnerability exists in the numeric fields, which are not properly sanitized. The SNMP injection vulnerability allows injecting arbitrary SNMP headers by improperly sanitizing the parameters passed to the mail() PHP function.