This exploit creates a malicious .mp3 or .wma file which causes the program to crash when opened.
This exploit creates a malicious .sav or .sac file which causes the program to crash when opened.
A vulnerability exists in SaurusCMSupdate4.7.0 which allows an attacker to include a remote file via the class_path parameter in the file.php and com_del.php scripts. This can be exploited to execute arbitrary PHP code on the vulnerable system.
In search.jsp file HTTP GET parameter 'q' is included to XPath query without sanitisation if its start with word 'related:'. This can lead to remote code execution.
phpMUR is vulnerable to a remote file disclosure vulnerability. This vulnerability allows an attacker to read any file on the server. The vulnerability exists due to insufficient sanitization of user-supplied input to the 'header' parameter in the 'getid3.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable script. This will allow the attacker to read any file on the server.
A Remote File Include vulnerability exists in clearBudget v0.9.8. An attacker can exploit this vulnerability to include a remote file containing malicious code and execute it on the vulnerable system. The vulnerability is due to the 'actionPath' parameter in the 'controller.class.php' script not properly sanitized before being used to include a file. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request containing a URL in the 'actionPath' parameter to include a remote file containing malicious code and execute it on the vulnerable system.
Windows Live Messenger is prone to a Denial of Service attack. By sending specially crafted messages that contain a large number of animations ('Smileys'), it is possible to make WLM consume large amounts of memory and CPU while it attempts to render the animated images, causing it to stop responding.
A buffer overflow vulnerability exists in Media Coder 0.7.5.4710, which could allow an attacker to execute arbitrary code on the vulnerable system. The vulnerability is due to insufficient boundary checks when handling specially crafted .m3u files. An attacker can exploit this vulnerability by enticing a user to open a malicious .m3u file. Successful exploitation could result in arbitrary code execution in the context of the application.
A local attacker may exploit this issue to execute arbitrary code with kernel-level privileges. Successful exploits will result in the complete compromise of affected computers. Failed exploit attempts may cause a denial-of-service condition.
MS10-051 is a buffer overflow vulnerability in the Windows HTTP service. It allows an attacker to execute arbitrary code on the target system by sending a specially crafted HTTP request. The vulnerability affects Windows XP, Windows Server 2003, and Windows Vista. The exploit code is written in Python and uses a socket to connect to the target system and send the malicious request.