The exploit overwrites the system.ini file, causing the PC to not restart. It is advised to make a copy of the file before running the exploit.
Microsoft Windows Vista (SP0) dumps interfaces when it receives this ARP packet. This DoS is useful for an internet cafe, wireless venue, or legitimate local attack. The victim will need to manually refresh their network interface.
This is an exploit code for a vulnerability in tinyidentd. It allows an attacker to execute remote code on the target system.
Multiple SQL Injection vulnerabilities in mcart.xls Bitrix module can be exploited to execute arbitrary SQL queries, obtain sensitive data, modify information in the database, and gain complete control over the vulnerable website. The vulnerabilities require the attacker to be authorized against the website and have access to the vulnerable module. However, the vulnerabilities can also be exploited via CSRF vector if the web application does not check the origin of received requests. This allows a remote anonymous attacker to create a page with a CSRF exploit, trick the victim into visiting this page, and execute arbitrary SQL queries in the database of the vulnerable website.
This exploit allows remote attackers to include arbitrary files via a specially crafted URL in the _MG_CONF[path_html] parameter in the ftpmedia.php script.
It is possible for an attacker to execute a DLL planting attack in Microsoft Office 2010 on Windows 7 x86 with a specially crafted OLE object.
This vulnerability allows an attacker to include arbitrary files from a remote server.
GDCM versions 2.6.0 and 2.6.1 are prone to an integer overflow vulnerability which leads to a buffer overflow and potentially to remote code execution. The vulnerability is triggered by the exposed function gdcm::ImageRegionReader::ReadIntoBuffer, which copies DICOM image data to a buffer. ReadIntoBuffer fails to detect the occurrence of an integer overflow, which leads to a buffer overflow later on in the code.
This exploit takes advantage of an uninitialized pb structure variable on .bss to execute arbitrary commands with root privileges. It uses the reverse connect-back method and targets systems running Fedora Core 6 with exec-shield enabled. The exploit modifies the arguments passed to execle() to execute a command of the attacker's choice. It also searches for 8 bytes of null from the stack to define an environment variable. The exploit requires 13 ret (pop %eip) codes to reach the desired stack position. It has been tested on Fedora Core 6 with webdesproxy version 0.0.1.
The attached swf file causes an out-of-bounds memset in BlurFilter processing. Note that Chrome aborts when processing the swf.