This exploit targets Opera 8.2 on Windows XP Professional SP2. By creating a specially crafted HTML file, an attacker can trigger a denial of service condition, causing the application to crash. This can be achieved by providing a large input to the 'bodyA' tag, causing a buffer overflow.
This exploit targets the phpscripte24 Live Shopping Multi Portal System by injecting SQL commands through the 'seite' parameter in the index.php file. It allows an attacker to execute arbitrary SQL queries on the database, potentially leading to unauthorized access or data manipulation.
This module exploits a stack overflow in IDEAL Migration version 4.5.1. By creating a specially crafted ipj file, an an attacker may be able to execute arbitrary code.
The vulnerability allows an attacker to inject SQL queries into the application's database. By exploiting this vulnerability, an attacker can retrieve sensitive information from the database.
Scanning of malicious file causes heap corruption in context of the service process (ekrn.exe). See Dr. Watson log (drwtsn32.log) for details.
This exploit triggers a crash in MS Paint due to an integer overflow vulnerability. The exploit code is written in Perl and it sends a specially crafted image file to the target. When MS Paint tries to open the image, it crashes.
The exec_ibcs2_coff_prep_zmagic() function in OpenBSD 2.x through 3.3 allows remote attackers to execute arbitrary code via a crafted iBCS2 header with a length parameter that exceeds the actual header length, which triggers a stack-based buffer overflow.
This is a local buffer overflow exploit for PhotoFiltre Studio X .tif files. It allows an attacker to overwrite the seh handler with a pop pop ret instruction and overwrite the next seh with a jmp ebp instruction. The exploit then finds the exact location ebp points to and writes a jmp 0x40 bytes instruction. This exploit does not have space for shellcode, so a jmp ebp option is chosen instead of an egghunter. The exploit is designed for MS Windows xp pro sp3.
This exploit allows remote attackers to bypass ASLR and DEP protections in ProSSHD 1.2, leading to unauthorized access.
This is a 0day exploit that crashes all major browsers including Mozilla Firefox, Internet Explorer, Google Chrome, Netscape, and Opera. The exploit utilizes a DoS (Denial of Service) attack by creating a buffer overflow. It injects a script into the browser's body onload event, which continuously adds characters to a buffer until it overflows and crashes the browser.