This PoC code creates a .PLS file with a buffer of 10000 'A' characters, which causes a buffer overflow when opened in Tuniac v.090517c, resulting in a crash.
FotoTagger is prone to a buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. An attacker can exploit this issue to execute arbitrary code in the context of the application. Failed exploit attempts will likely result in a denial-of-service condition.
An attacker can inject malicious SQL queries into the 'page' parameter of the 'stats.php' script. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. The malicious code can be used to read, modify or delete data from the database.
Batch Picture Protector is a powerful and easy-to-use batch image watermarking tool. It protects your digital images and artwork by adding professional transparent watermarks that combine text, illustrations and graphics. When used in conjunction with your favorite image editing software, a watermark can even contain your copyright, website url or logo image. Batch Picture Protector is the best way to achieve faster and simpler image protection. This watermarking software is particularly useful to designers, artists and banner makers who send artwork proofs to customers for evaluation. Those who publish images on internet web galleries can also protect image copyright using this watermarking software. By using the software, digital photos can be effectively protected from unauthorized use. This photo watermark software places permanent watermarks that cannot be removed.Batch Picture Protector is compatible with all major image formats, including JPEG, BM
This exploit is used to crash the Cerberus FTP Server V 3.0.3 by sending a packet of size 520 bytes. The exploit is written in C language and uses the Winsock2 library.
A buffer overflow vulnerability exists in Apple Safari on Iphone 3G, OS 3.0.1. Launch Safari, enter the page and after a few seconds Safari will crash and black screen will appear. The exploit code is a PHP script that sets a time limit of 0 and creates a variable with 100000 'A's. This variable is then used in an iframe src tag with a tel: prefix.
This exploit allows an attacker to inject malicious SQL queries into a vulnerable web application. The malicious SQL query is sent to the web application, which then processes the query and returns the results. The attacker can then use the results to gain access to sensitive information stored in the database.
FtpXQ FTP Server 3.0 is vulnerable to a remote denial of service attack. By sending a large string of './A' characters to the FTP server, it will crash. This vulnerability is due to a stack-based buffer overflow in the ABOR command.
Exploits the UTF-8 URL overflow vulnerability described in CVE-2008-0016. As of September 2009 there are no public exploits for this vulnerability. However, according to securityfocus an exploit is available in both Canvas and Core Impact.
Ipsbitch.cpp is a proof-of-concept exploit for a buffer overflow vulnerability in Ipswitch IMAP server versions prior to 9.20. The exploit adds a local admin account USER=r00t PASS=r00tr00t!!