This exploit allows an attacker to add an admin user to the Movies Library 2.0 application. The attacker can send a crafted request to the targeted application, which will add a new user with admin privileges.
This exploit allows an attacker to add an admin user to the News 1.0 system without proper authorization. The exploit consists of a form that sends a POST request to http://localhost/News/admin/index.php with the necessary parameters to add a new user with admin privileges. The parameters include the username, password, email, and group ID. The attacker can modify these parameters to add any desired user.
This exploit allows an attacker to add an admin user to the E-Store 1.0 application by sending a crafted HTTP request. The attacker can specify the username, password, email, and group ID for the new admin user.
This exploit takes advantage of a buffer overflow vulnerability in GOM Media Player version 2.1.6.3499. It generates a malicious avi file that, when opened with GOM Player, can cause a crash or denial of service.
The Zend Java Bridge component in Zend Server v5.0.2, Zend Server Community Edition v5.0.2, and previous releases allows remote attackers to execute arbitrary Java code via a crafted serialized Java object, related to the Java Class Library (JCL) and Java Reflection.
The DoS is caused by an access violation exception in the module mpc-hc.exe. The exploit code is provided in a file named 'Media Player Classic - Home Cinema 1.5.0.2827 - AVI DoS.avi'. Opening this file in the vulnerable version of Media Player Classic - Home Cinema (1.5.0.2827) will cause the DoS.
The vulnerability exists in the in_avi.dll module of Winamp 5.61. It can be triggered by opening a specially crafted AVI file, causing a division by zero error and crashing the application.
The DoS is caused by an unhandled exception in the module Shmedia.dll, which is loaded via Explorer.exe. The exploit code contains assembly instructions that manipulate registers and perform an integer division by zero, resulting in a crash.
This exploit causes a denial of service (DoS) by exploiting a vulnerability in GOM Player version 2.1.28.5039. By opening a specially crafted AVI file, an attacker can trigger an access violation exception, causing the application to crash and become unresponsive.
This exploit takes advantage of a local SEH buffer overflow vulnerability in IDEAL Administration 2011 v11.4. It allows an attacker to execute arbitrary code on the target system by overflowing the SEH buffer. The exploit uses a bind shell payload encoded with x86/alpha_mixed encoder. The payload sets the LPORT to 4444 and uses the seh exit function.