T-dreams Announcement Script is vulnerable to SQL injection. An attacker can inject malicious SQL code into the 'key' parameter of the MainAnnounce2.asp page. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
The parameter testo passed to bi.php (site and admin frontends) is properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. The parameter testo passed to stampa.php, pdf.php and models/biblioteca.php (when 'view' is set to 'biblioteca') is properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
A SQL injection vulnerability exists in the Joomla component com_zina, which allows an attacker to inject malicious SQL queries via the 'zina[search]' parameter. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
A buffer overflow vulnerability exists in PlayPad Music Player v1.12 when processing .mp3 files. By creating a specially crafted .mp3 file and loading it into the player, an attacker can cause a crash, resulting in a denial of service condition.
AV Music Morpher Gold is vulnerable to a local crash when a specially crafted .m3u file is opened. The application will crash when a .m3u file containing 5000 'A' characters is opened. Additionally, .acd and .bdi files will also cause the application to crash.
A buffer overflow vulnerability exists in Karaoke Video Creator 2.2.8, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to a boundary error when processing a specially crafted .PK2 file. This can be exploited to cause a stack-based buffer overflow via an overly long string. Successful exploitation may allow execution of arbitrary code, but this has not been confirmed.
A Blind SQL Injection vulnerability exists in the Joomla Component com_extcalendar. An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable parameter extid in the cal_popup.php file. This can allow the attacker to gain access to sensitive information from the database.
d4rk-h4ck3r created a malicious .m3u file containing a long string of 'A' characters, which when opened in Fennec 1.2 Beta 3 caused a denial of service.
The vulnerability is triggered when a specially crafted .m3u file is imported into Tuniac. The file contains a long string of 'A' characters which causes the application to crash when the file is played.
This exploit allows a local user to gain root privileges on a vulnerable FreeBSD system. The exploit works by tampering with the /bin/sh file to contain a shellcode which does 'chmod a+s /tmp/sh', 'chown root /tmp/sh' and 'execve /tmp/sh2'. The exploit then uses a network connection to send the modified /bin/sh file to the vulnerable system and executes it as root.