This exploit targets the jetAudio software version 7.1.9.4030 plus vx. It utilizes a RET - Universal method to trigger a local stack overflow vulnerability. The exploit has been tested on Windows XP SP3 En. The exploit was written by corelanc0d3r and can be found at http://www.milw0rm.com/exploits/9359. The payload is prepared by creating a malicious .m3u file named 'c0d3rsploit.m3u'. The exploit includes a shellcode that executes a calc command.
The exploit causes Tuniac v.090517c to crash when opening a specially crafted .M3U file. It is not confirmed if code execution is possible with this exploit.
The procfs code (proc_misc.c) in Linux 2.6.14.3 and other versions before 2.6.15 allows attackers to read sensitive kernel memory via unspecified vectors in which a signed value is added to an unsigned value.
DeluxeFtp 6.x discloses passwords to local users.
This exploit targets the gld 1.4 software on various Linux distributions, including Red Hat, Gentoo, and Debian. It allows remote attackers to execute arbitrary code or cause a denial of service.
The 'auth.php' file in Mobilelib Gold v3 allows an attacker to bypass authentication and perform SQL injection. The 'adminName' parameter is not properly sanitized before being used in a SQL query, allowing an attacker to inject arbitrary SQL code. A successful exploit can result in unauthorized access to the application's database.
NT_Naming_Service.exe (License Manager 2005 for SAP Business One 2005-A) is vulnerable to a stack-based buffer overflow allowing for full system compromise by an unauthenticated user that has TCP/IP access to SAP's license service on TCP port 30000.
This exploit takes advantage of a buffer overflow vulnerability in VLC Media Player 0.8.6f. It allows an attacker to execute arbitrary code remotely by sending a specially crafted smb:// URI. The vulnerability was discovered by Pankaj Kohli and the exploit was developed by His0k4.
The exploit involves using JavaScript to create and manipulate objects in Internet Explorer. By using certain methods, an attacker can cause unexpected behavior or crash the browser. This can potentially lead to remote code execution.
There is a race condition when using appendChild to append an element in one window to an element in another. A 'dirty' read can be exploited to gain control over the process.