Many parameters of CLSID 052DF14F-6F28-44A0-9130-294FDA6176EB are vulnerable. This activex gives error like, Buffer Overrun detected. This is complied with /GS flag. The all vulnerable parameters are Slot51, Slot52, Slot61, Slot62, Slot7, Slot71, Slot72.
This exploit targets GNU imap4d mailutils-0.6 search and takes advantage of a remote format string vulnerability. By using the -d option, the imap4d daemon inherits the virtual address of the parent process, which is mapped randomly. This allows the attacker to possibly obtain the address of the library and execute arbitrary code. The exploit includes a one-shot technique without brute-forcing and uses xterm to execute a remote shell.
This vulnerability occurs when processing the SCRIPTDATASTRING object in a Flv file. It leads to an access violation, resulting in a crash.
When setting the scrollRect attribute of a MovieClip in AS2 with a custom Rectangle, it is possible to free the MovieClip while a reference remains in the stack. This can be exploited by creating a TextField with the same depth as the targeted MovieClip, leading to a use after free vulnerability and potentially causing Flash to crash.
The vulnerability allows an attacker to include remote files through the affected software. The issue is due to the insecure inclusion of files in the /common.php file, which can be exploited by an attacker to execute arbitrary code.
This exploit is for Opera 9.2 torrent file remote denial of service vulnerability. By sending a malformed torrent file, an attacker can cause Opera to use 100% CPU and eventually crash. The vulnerability can be mitigated by disabling the bittorrent client within Opera. The exploit has been tested on Windows XP service pack 1 and 2.
The Neturf eCommerce Shopping Cart is vulnerable to a cross-site scripting (XSS) attack due to inadequate input sanitization. An attacker can exploit this vulnerability by injecting malicious script code into the 'SearchFor' parameter of the 'search.php' page. When an unsuspecting user visits the affected site and performs a search, the injected script code will execute in their browser, allowing the attacker to potentially steal authentication credentials and launch further attacks.
The Samba software is prone to an unspecified remote code-execution vulnerability. An attacker can exploit this issue to execute arbitrary code with root privileges. Failed exploit attempts will cause a denial-of-service condition.
The vulnerability allows an attacker to disclose files on the server by exploiting the 'navigator_ok.php' script in Pagode 0.5.8. By providing a specially crafted 'asolute' parameter in the URL, an attacker can read arbitrary files on the server, such as the '/etc/passwd' file.
This is a buffer overflow exploit for Winamp Media Player. The exploit is in the form of an executable file (winamp.exe) and a Perl script (winamp.pl). The exploit takes advantage of a buffer overflow vulnerability in Winamp to cause a denial-of-service (DOS) attack. The exploit creates a malicious AVI file (Dr.Trojan.avi) that triggers the buffer overflow when opened in Winamp. The exploit was discovered by the DeltahackingTEAM and the bug was found and exploited by Farzad.Sharifi (Dr.Trojan). The risk level of this vulnerability is high.