This exploit is a stack-based buffer overflow vulnerability in the Streaming Audio Player 0.9. It allows an attacker to execute arbitrary code on the vulnerable system by sending a specially crafted .M3U file. The vulnerability is caused due to a boundary error when handling .M3U files, which can be exploited to cause a stack-based buffer overflow by sending a specially crafted .M3U file with an overly long string.
A vulnerability exists in the Joomla Aclassf Component, which allows an attacker to inject arbitrary SQL commands via the 'id' parameter in a 'details' action to the 'com_aclassf' component.
This exploit allows an attacker to steal the cookie of an admin user of LinkBase 2.0. The attacker creates two files, stealer.php and log.txt, and uploads them to their host. The attacker then registers as a user with a script that redirects the admin to the cookie stealer.php file when they visit the 'Users' menu from the admin panel.
A buffer overflow vulnerability exists in Streaming Audio Player 0.9 when handling .M3U files. A specially crafted .M3U file can cause a buffer overflow, resulting in arbitrary code execution. This vulnerability is triggered when a user opens a malicious .M3U file with Streaming Audio Player 0.9.
TemaTres is vulnerable to Blind SQL Injection. This vulnerability allows an attacker to execute arbitrary SQL commands on the vulnerable system. This vulnerability can be exploited by remote attackers without authentication.
A buffer overflow vulnerability exists in 32bit FTP (09.04.24) (Banner) when a maliciously crafted MKD command is sent to the FTP server. This can allow an attacker to execute arbitrary code on the vulnerable system.
A buffer overflow vulnerability exists in 32bit FTP (09.04.24) when handling a CWD response. An attacker can exploit this vulnerability to execute arbitrary code on the target system by sending a specially crafted CWD response. This vulnerability was exploited by His0k4 and tested on Windows XP SP3.
Grabit is prone to a stack-based buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. An attacker can exploit this issue to execute arbitrary code in the context of the application. Failed exploit attempts will result in a denial-of-service condition.
A client side vulnerability in the product allows remote servers to cause the client to crash by sending it a large banner. The exploit is triggered when a malicious server sends a large banner of 5060 bytes to the client, which causes a buffer overflow and the client crashes.
Ublog access version Arbitrary Database Disclosure Exploit is a perl script which exploits the vulnerability in the Ublog access version. It allows an attacker to access the mdb-database/blog.mdb file of the vulnerable website. The attacker can use the dork http://www.google.co.ma/search?q=index.asp%3Farchivio%3DOK&hl=fr&start=20&sa=N to search for vulnerable websites. The exploit uses the LWP::Simple and LWP::UserAgent modules to connect to the server and search for the file. If the file is found, the contents of the file are displayed.