The KwsPHP Module (jeuxflash) is vulnerable to a remote SQL injection attack. An attacker can exploit this vulnerability to execute arbitrary SQL queries and potentially gain unauthorized access to the database.
The Geovision Inc. IP Camera/Video/Access Control devices suffer from multiple vulnerabilities including remote command execution, stack overflow, double free, and unauthorized access. These vulnerabilities allow an attacker to execute arbitrary commands on the affected devices remotely without authentication.
Pwnpress is a tool that implements multiple techniques, bugs, and tricks for compromising Wordpress-based blogs. It combines exploits in the necessary order to retrieve necessary information and make the exploitation process as reliable as possible.
This exploit takes advantage of a buffer overflow vulnerability in the Delikon BlackJumboDog FTP Server version 3.6.1. By sending a specially crafted payload to the server, an attacker can execute arbitrary code on the target system. The shellcode used in this exploit opens a port on 7777, allowing the attacker to upload and execute a malicious executable. The shellcode exits with ExitThread to prevent crashing the service.
The dbPowerAmp Music Converter application and dbPowerAmp Player are prone to buffer overflow conditions. These issues affect current and earlier versions of the dbPowerAmp Player and Music Converter. The Music Converter application allocates a 215 byte buffer for the file name within the playlist. By opening a playlist with a long file name, it is possible to overflow this buffer and overwrite the EIP with arbitrary code.
The vulnerability exists in the 'rubrik.php' file of Webace-Linkscript V1.3 Special Edition. The 'id' parameter in the URL is not properly filtered, allowing users to manipulate SQL queries through their browser. An attacker can exploit this vulnerability to execute arbitrary SQL queries and potentially gain unauthorized access to the database.
The exploit uses a buffer overflow vulnerability in OTSTurntables 1.00 to execute arbitrary code. It overflows a buffer with a length of 277 characters, then overwrites the EIP (Extended Instruction Pointer) with the address of the 'jmp esp' instruction in shell32.dll on Windows XP SP0. It also contains a shellcode of 224 bytes. If the SEH (Structured Exception Handling) method is used, additional information is provided. The exploit was created by the author with the value 0x58.
The Enterprise version of PyroBatchFTP is affected by a Local Buffer Overflow vulnerability. The application does not check bounds when reading the file that will execute the script, resulting in a classic Buffer Overflow overwriting SEH handler. To exploit the vulnerability, only a local script is needed to interact with the application.
This exploit takes advantage of a buffer overflow vulnerability in Virtual DJ 5.0. It allows an attacker to execute arbitrary code by creating a specially crafted .m3u file.
The vulnerability exists in the $vwar_root parameter in the modules/vwar/convert/mvcw_conver.php file. An attacker can include remote files by manipulating the 'vwar_root' parameter. This can lead to remote code execution or information disclosure.