A buffer overflow vulnerability exists in Citadel/UX when processing the USER parameter, which can lead to a denial of service (DoS) condition. The vulnerability was discovered by CoKi and a proof-of-concept exploit was developed. The exploit is not straightforward due to the presence of the tolower() function, but ret-to-libc technique can be used on certain systems.
the DivFixppCore::avi_header_fix function in src/DivFix++Core.cpp in DivFix++ v0.34 can cause a denial of service(invalid memory write and application crash) via a crafted avi file.
This exploit allows an attacker to execute SQL commands remotely in SimpleBlog version 3.0. By injecting a specially crafted SQL query, the attacker can retrieve admin credentials from the database.
The TDStretch::processSamples function in source/SoundTouch/TDStretch.cpp in SoundTouch 1.9.2 can cause a denial of service(infinite loop and CPU consumption) via a crafted wav file.The TDStretch::acceptNewOverlapLength function in source/SoundTouch/TDStretch.cpp in SoundTouch 1.9.2 can cause a denial of service(memory allocation error and application crash) via a crafted wav file.
Open AudioCoder then drag & drop the .m3u file in it and then press the START button.
The exploit allows an attacker to retrieve the admin login details by manipulating the SQL query.
This exploit allows remote code execution on systems running Nessus Vulnerability Scanner 3.0.6. The bug was discovered by Krystian Kloskowski (h07) and was tested on Nessus 3.0.6 with IE 6 on Windows XP SP2 (Polish). The exploit injects a command to shut down the system with a delay of 1000 milliseconds and displays the message 'hello world ;]'. It then saves a file named 'exec.bat' in a specific directory.
There is a heap buffer overflow in WebKit. The vulnerability was confirmed on ASan build of WebKit nightly.
This exploit allows an attacker to gain remote root access to a PK5001Z CenturyLink Router/Modem. The exploit leverages a vulnerability in the router's firmware to execute arbitrary code and gain root privileges. By sending a specially crafted payload, the attacker can bypass authentication and gain full control over the device.