This vulnerability allows an attacker to inject SQL queries into the application's database, potentially gaining unauthorized access or modifying data.
This is a buffer overflow exploit for the PMSoftware Simple Web Server. It allows an attacker to execute arbitrary code on the target system.
The WheresJames Webcam Publisher Beta 2.0.0014 is vulnerable to a buffer overflow. The exploit allows an attacker to overwrite the SEH handler and execute arbitrary code.
The Firelinking - Proof-of-Concept is a proof-of-concept exploit designed for Firefox 1.0.2. It takes advantage of a bug in bugzilla #290036 to execute arbitrary JavaScript code in the context of the user's browser.
This is a proof of concept exploit for the vulnerability in VLC Media Player version 1.0.0 and 1.0.1. It exploits a remote stack overflow vulnerability in the handling of smb:// URIs. By sending a specially crafted URI, an attacker can cause a stack overflow and potentially execute arbitrary code on the target system.
This exploit targets the FTPShell Client version 4.1 RC2 on Windows XP SP3. It exploits a stack overflow vulnerability in the 'Name Session' feature of the program. The exploit code contains a shellcode for executing the 'calc.exe' program. The exploit is coded by 'zec' and can be contacted at zec@bsdmail.com.
There is an authentication bypass vulnerability in page=CD35_SETUP_01 that allows you to set a new password even if the password was previously set. By setting a new password with more than 512 characters, the password gets reset and next time you access the router you will be prompted for a new password.
When processing an IP packet with an option size (2nd byte after the option) of 39, it will crash due to an off-by-one error. The maximum available size for the whole IP options field is 40, and two bytes are already used. Checks are done to validate that the option size field is less than 40, but a value of 39 is not checked properly. This vulnerability does not affect all options and is dependent on the underlying protocol.
This is a proof of concept for a remote stack buffer overflow vulnerability in Embedthis Appweb. The vulnerability occurs when processing debugging information in the application. By sending a specially crafted request, an attacker can overflow the stack and potentially execute arbitrary code. This vulnerability has been identified in the ASM instructions provided.
This exploit is a universal buffer overflow in MediaCoder version 0.7.1.4490. It is triggered by opening a specially crafted .lst or .m3u file. The exploit overflows the SEH (Structured Exception Handler) and allows arbitrary code execution.