This exploit targets the Audio Workstation v6.4.2.4.0 software. It leverages a buffer overflow vulnerability in the .pls file format to execute arbitrary code on the targeted system. The exploit has been tested on Windows XP SP3.
The vulnerability exists in AlefMentor 2.0, where an attacker can inject SQL queries through the 'cont_id' parameter in the 'cource.php' file. This can lead to unauthorized access or manipulation of the database.
This is a 0day exploit for a buffer overflow vulnerability in gAlan.
The exploit is a proof of concept for a remote memory corruption vulnerability in Polipo version 1.0.4. The vulnerability is caused by a flaw in the client.c file of Polipo, where a memmove function call does not properly handle the reqlen and reqbegin variables. This can lead to a segmentation fault and potential remote code execution.
The addlist.php file in the newsletter/admin directory of the server application does not properly sanitize the user-supplied input. This allows an attacker to inject malicious code, such as a script tag, which can be executed by other users visiting the page. In this specific case, the vulnerability allows an attacker to execute arbitrary JavaScript code and potentially steal cookies or perform other malicious actions on behalf of the user.
This is a buffer overflow exploit for the M3U To ASX-WPL 1.1 software. It uses a SEH overwrite method and a shellcode to execute arbitrary code on the target system.
This exploit takes advantage of a local buffer overflow vulnerability in IDEAL Administration 2009 v9.7. It allows an attacker to execute arbitrary code on the target system. The exploit payload is a shell_bind_tcp payload with an encoder: x86/alpha_mixed. It uses the SEH (Structured Exception Handling) technique and binds a shell to port 4444 on the target system.
This exploit allows for remote code execution through a buffer overflow vulnerability in RPCDCOM2.c version 1.1. The vulnerability is triggered by sending a specially crafted bind request to the target system. The exploit payload is included in the bindstr array. By exploiting this vulnerability, an attacker can execute arbitrary code on the target system.
When a crafted .PNG file is opened, a stack buffer overflow occurs due to DEP, resulting in the overwrite of a SEH handler with a POP/POP/RET instruction from the gear12d.dll module. The exploit is universal and can execute multiple shellcodes.
The Public Media Manager <= 1.3 has a vulnerability in the forms_dir parameter of the comcal/calmenu.php file. An attacker can include a remote file using the forms_dir parameter, which can lead to remote code execution.