This vulnerability involves a memory comparison function that is remotely accessible via the remote procedure call in the Diskeeper administrative interface. By making use of shared user memory at 0x7FFE0000, an attacker can learn information such as Windows drive, path, and version. Additionally, an attacker can also get the name, path, version, and base address of all loaded modules in the process, defeating address space randomization (ASLR) in Windows Vista.
The vulnerability exists in the 'query' parameter of the search.php page in GetMyOwnArcade. The parameter is not properly filtered before being used in a database query, allowing an attacker to inject malicious SQL code. By using the UNION-SELECT technique, an attacker can extract sensitive information such as usernames and passwords from the database.
The EDraw Office Viewer Component 5.1 (officeviewer.ocx v. 5.1.199.1) is vulnerable to an insecure method called "HttpDownloadFile()". This vulnerability allows an attacker to download arbitrary files from a remote server to a user's machine by exploiting this insecure method.
This exploit allows an attacker to crash the Ground Control server or client. The attack can be performed by broadcasting a message to all clients or directly targeting a specific server. The attacker must specify the IP or hostname of the server. The vulnerability is caused by a buffer overflow when processing certain packets. By sending a specially crafted packet, an attacker can trigger the crash. This vulnerability affects Ground Control versions up to 1.0.0.7.
Easy Chat Server has a built-in web server that allows users to log in. The login page has a maximum character limit of 30 for the Name and Password fields. If an attacker inserts a long Name and Password by editing or creating their own login page, the chat server will crash.
This exploit is a buffer overflow vulnerability in the IMAP protocol. It allows an attacker to execute arbitrary code on a target system by sending a specially crafted message.
The username field on the login page is susceptible to SQL injection. The exploit involves manipulating the 'username' parameter in the login URL to inject SQL code that bypasses the login authentication and grants unauthorized access to the system.
The main.cpp file contains a buffer overflow vulnerability that can be exploited by sending a crafted packet to the server. The vulnerability is present in the craft_pkt[] array where the packet is constructed. An attacker can exploit this vulnerability by sending a packet with a payload that is longer than the buffer size, causing a buffer overflow and potentially allowing the attacker to execute arbitrary code on the server.
Pulls user details from the database, returns multiple data
Racer v0.5.3 beta 5 is prone to a buffer overflow vulnerability in the server and client. By sending an overly long buffer, an attacker can control the eip register and execute arbitrary code. The exploit has been tested on Windows XP SP2 English.