This exploit is a buffer overflow vulnerability in CoolPlayer Portable version 2.19.2 on Windows Vista Business 32 bit. It bypasses ASLR by using a non-aslr module. It uses a 227 byte windows/exec shellcode to execute CMD=calc.exe. It creates a malicious file exploit.m3u.
The vulnerability exists due to insufficient sanitization of user-supplied input in 'gal_id' parameter of 'getimages.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database. Successful exploitation of this vulnerability may allow an attacker to gain access to sensitive information from the database.
A SQL injection vulnerability exists in WordPress Zotpress plugin version 4.4 and earlier. The vulnerability is due to insufficient sanitization of user-supplied input in the 'api_user_id', 'account_type', and 'displayImages' parameters of the 'zotpress.rss.php' script. An attacker can exploit this vulnerability to inject and execute arbitrary SQL commands in the application's back-end database.
This module exploits a vulnerability in Apple QuickTime Player 7.60.92.0. When opening a .mov file containing a specially crafted PnSize value, an attacker may be able to execute arbitrary code.
Openads-2.0.11 is vulnerable to Remote File Inclusion (RFI) vulnerability. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable parameter 'row' in 'lib-view-main.inc.php' file. This malicious URL can be used to execute arbitrary code on the vulnerable server.
A SQL injection vulnerability exists in the WordPress Facebook Opengraph Meta Plugin plugin version 1.0. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. This can allow the attacker to execute arbitrary SQL commands on the underlying database.
The OcxSpool function is affected by a format string vulnerability caused by the usage of the Msg string provided by the attacker directly with vsprintf() without the required format argument. WriteTextData and CloseFile allow to corrupt arbitrary zones of the memory through a fully controllable stream identifier in fclose() and fwrite().
This module exploits a stack-based buffer overflow on DVD X Player 5.5 Pro and Standard. By supplying a long string of data in a plf file (playlist), the MediaPlayerCtrl.dll component will attempt to extract a filename out of the string, and then copy it on the stack without any proper bounds checking, which casues a buffer overflow, and results arbitrary code execution under the context of the user.
This test will crash Linux 3.0.0 by using a buffer overflow vulnerability. The exploit is triggered by a call to the perf_event_open() system call with a PERF_COUNT_SW_CPU_CLOCK configuration. This causes a SIGIO signal to be sent to the process, which is then handled by the our_handler() function. This function increments the total variable, which can be used to cause a crash.
The vulnerability exists due to insufficient filtration of user-supplied data passed via the 'term' parameter to '/wp-content/plugins/search-autocomplete/includes/tags.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database, cause disclosure of sensitive information, modify data and compromise vulnerable application.