An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable application. This can be done by appending the malicious SQL query to the vulnerable parameter in the HTTP request. This can allow the attacker to gain access to the application database and potentially gain access to sensitive information.
SWF Opener is prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data. An attacker can exploit this issue to execute arbitrary code in the context of the application. Failed exploit attempts will likely result in a denial-of-service condition.
This exploit allows an attacker to remotely access the database of Exjune Guestbook v2. The vulnerable path is /admin/exdb.mdb. The exploit uses the LWP::UserAgent module to access the database and save it to a local file.
A vulnerability in WebFileExplorer V3.1 allows an attacker to access the database file DB.MDB, which contains sensitive information such as usernames and passwords.
An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable server. The attacker can inject malicious SQL queries in the 'wrap_script' parameter of the 'module_wrapper.asp' script. This can allow the attacker to access or modify the data in the backend database.
Photo-GraffixV3.4.zip is vulnerable to Local File Inclusion vulnerability. An attacker can exploit this vulnerability by uploading a malicious shell file to the vulnerable web application and then accessing the file via the vulnerable wmprocess.php script. This will allow the attacker to execute arbitrary code on the server.
A buffer overflow exploit in Perl which is used to execute arbitrary code. It uses win32_exec payload from Metasploit and the exploit is made up of junk bytes, NOP sled, shellcode and return address.
A buffer overflow vulnerability exists in GOM Player 2.1.16.6134. A specially crafted .srt file with a length of 10240 x 4 bytes can cause a denial of service condition when opened with GOM Player. This vulnerability affects Windows XP, Windows Vista, and Windows 7.
This exploit is based on the 'exit_notify()' CAP_KILL verification bug found by Oleg Nestorov. It allows an attacker to send arbitrary signals to a privileged (suidroot) parent process. Due to a bad check, the child process with appropriate exit signal already set can first execute a suidroot binary then exit() and thus bypass in-kernel privilege checks. The attacker uses chfn and gpasswd for that purpose.
PeterConnects products use a web server that is vulnerable to classic directory traversal (hello 1987) that allows for arbitrary file access.