Chasys Media Player 1.1 is vulnerable to a stack overflow vulnerability when a specially crafted .m3u file is imported. The vulnerability is caused due to a boundary error when handling the header of the .m3u file. This can be exploited to cause a stack-based buffer overflow by sending a specially crafted .m3u file with an overly long header. Successful exploitation could allow execution of arbitrary code.
Chasys Media Player is vulnerable to a local stack overflow vulnerability. The vulnerability is caused due to a boundary error when handling .pls files. This can be exploited to cause a stack-based buffer overflow by sending a specially crafted .pls file to the vulnerable application. Successful exploitation could allow execution of arbitrary code.
Chasys Media Player 1.1 is vulnerable to a local buffer overflow vulnerability when a specially crafted .pls file is opened. This could allow an attacker to execute arbitrary code on the vulnerable system.
This exploit allows an attacker to include a remote file on the web server. The attacker can also include a local file on the web server by using a null byte injection. This vulnerability can be exploited by sending a specially crafted HTTP request containing the malicious URL to the vulnerable web server.
The vulnerability exists due to insufficient sanitization of user-supplied input in the 'id' parameter of the 'page_id' variable in the 'index.php' script. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation allows to read arbitrary data from the database, including passwords and other sensitive information.
GDL 4.x is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to manipulate SQL queries and gain access to unauthorized information. This issue affects versions 4.0 and 4.2.
Talkative IRC 0.4.4.16 suffers from a stack based buffer overflow vulnerability that enables us to gain full control over the application and execute arbitrary commands. ECX and EIP registers gets overwriten, so does the SEH.
Input passed to the 'SearchField' parameters in 'UserView_list.php' is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Vulnerable Pages: 'orders_list.php' , 'users_list.php' , 'Administrator_list.php' Its possible to obtain plain text passwords from database by blind fishing exploit.
A buffer overflow vulnerability exists in Gom Encoder when handling subtitle files. A specially crafted subtitle file can cause a buffer overflow, resulting in arbitrary code execution. An attacker can exploit this vulnerability to execute arbitrary code in the context of the application.
A local heap overflow vulnerability exists in WinAsm Studio 5.1.5.0. By supplying a specially crafted WinAsm project file, an attacker can overwrite a heap buffer and execute arbitrary code. This vulnerability is due to a lack of proper bounds checking when processing project files. This can be exploited to execute arbitrary code by tricking a user into opening a specially crafted project file.