The DVD X Player 5.5 Professional software is vulnerable to a buffer overflow attack. By crafting a specially formatted .plf file, an attacker can overwrite the program's memory and potentially execute arbitrary code. This exploit takes advantage of a JMP ESP instruction in the EchoDelayProcess.dll module to redirect program execution to the attacker's shellcode. The shellcode used in this exploit launches the Windows calculator application.
The Omnistar Mailer software is vulnerable to SQL Injection. An attacker can bypass authentication by using the payload ' or 1=1 or ''=' in both the username and password fields.
The WordPress Facebook Promotions plugin version 1.3.3 is vulnerable to SQL injection. An attacker can exploit this vulnerability by sending a specially crafted request to the fbActivate.php file, allowing them to execute arbitrary SQL queries.
This exploit takes advantage of a buffer overflow vulnerability in yahoo! player version 1.5.01.409. By crafting a specially crafted .m3u file, an attacker can trigger a buffer overflow and execute arbitrary code on the target system. The exploit uses a short jump instruction followed by a POP POP RET sequence to overwrite the Structured Exception Handler (SEH) and gain control of the program flow. The exploit payload contains shellcode that spawns a calculator application. This vulnerability has been tested on Windows XP SP3.
This exploit bypasses DEP (Data Execution Prevention) for Free MP3 CD Ripper version 1.1. It allows an attacker to execute arbitrary code on a vulnerable system.
The WordPress Photoracer Plugin version 1.0 is vulnerable to multiple XSS and SQL Injection vulnerabilities. The vulnerabilities exist in the 'mostvoted.php' and 'mostviewed.php' files. The 'postid' parameter in these files is not properly validated or filtered, allowing an attacker to inject malicious SQL queries. This can lead to unauthorized access, data manipulation, and potentially remote code execution. An example SQL Injection payload is provided in the description.
The WordPress Super CAPTCHA plugin version 2.2.4 is vulnerable to SQL injection. An attacker can exploit this vulnerability by sending a specially crafted request to the 'markspam' parameter in the 'admin.php' page of the plugin. This allows the attacker to execute arbitrary SQL queries on the underlying database.
The WordPress Js-appointment plugin version 1.5 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending a crafted request to the 'searchdata.php' file, which does not properly sanitize user-supplied input, resulting in SQL injection. This can lead to unauthorized access to the database and potentially allow the attacker to execute arbitrary SQL queries.
This exploit takes advantage of a SEH (Structured Exception Handling) overwrite vulnerability in multiple F-Secure products. It uses heap spray techniques to exploit the vulnerability.
The WordPress MM Duplicate plugin version 1.2 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending a crafted request to the 'duplicate' parameter in the 'index.php' file. This can lead to unauthorized access, data manipulation, or data leakage.