Copies a file to any privileged location on disk
ACDSee is vulnerable to an unspecified buffer overflow when processing a crafted .XPM file. This exploit runs calc.exe or binds shell to port 4444, and works against ACDSee and ACDSee Quick View.
The uPHP_ring_website portal is vulnerable to SQL injection. An attacker can exploit the vulnerability by injecting malicious SQL queries through the 'ring' parameter in the index.php file. The attacker can retrieve sensitive information such as admin usernames and passwords or user details.
Doing reverse engineering of the protocol was found several ways to cause a crash in the nvpmgr.exe process. The entire application (all processes) will die and it won't be able to restart again by itself unless someone do it manually.
This module embeds an exploit into an uncompressed map file (.h3m) for Heroes of Might and Magic III. Once the map is started in-game, a buffer overflow occurring when loading object sprite names leads to shellcode execution.
This is an exploit for a SEH buffer overflow vulnerability in Tomabo MP4 Player version 3.11.3. By crafting a specially crafted .m3u file, an attacker can overwrite the Structured Exception Handler (SEH) to execute arbitrary code.
Photofiltre is vulnerable to an unspecified buffer overflow when processing a crafted .TIF file. This exploit just beeps (useless but incredibly noisy!!).
The Supasite v1.23b has a vulnerability that allows remote attackers to include arbitrary files. This can lead to remote code execution and unauthorized access to sensitive information.
The SQL Injection vulnerability in the Count Per Day WordPress plugin allows remote attackers with administrative privileges to execute arbitrary SQL commands and gain control of sensitive information in the application's database. The vulnerability is caused by insufficient filtration of input data passed via the 'cpd_keep_month' HTTP POST parameter to the '/wp-admin/options-general.php' script. An attacker can exploit this vulnerability through a CSRF vector since the application does not check the origin of HTTP requests.
By opening a malformed pdf document, it is possible to crash Foxit Reader, causing the victim to lose any unsaved data. The vendor has been notified. It is also possible to crash Foxit Reader via Opera or Internet Explorer upon opening the pdf file to view online.