This exploit takes advantage of a buffer overflow vulnerability in the 'Enter User Name' field of Easy WMV/ASF/ASX to DVD Burner version 2.3.11. By pasting specific content into this field, an attacker can trigger the overflow and potentially execute arbitrary code.
This perl script exploits a remote SQL injection vulnerability in Envolution <= v1.1.0. It allows an attacker to retrieve the username and password (md5) of a specific member using their member id. The vulnerability is due to improper input validation in the 'modules.php' file. By crafting a malicious request, an attacker can inject SQL code and retrieve sensitive information from the database.
This exploit triggers a remote SEH buffer overflow in Sync Breeze Enterprise v9.9.16. By sending a specially crafted request to the web server, an attacker can execute arbitrary code on the target system.
This exploit takes advantage of a buffer overflow vulnerability in Disk Savvy Enterprise version 9.9.14. By sending a specially crafted request to the server, an attacker can trigger a stack-based buffer overflow, overwriting the Structured Exception Handler (SEH) and gaining control of the program execution flow. This allows the attacker to execute arbitrary code on the target system.
This exploit targets a buffer overflow vulnerability in Dup Scout Enterprise v 9.9.14. It allows an attacker to execute arbitrary code on the target system by sending a specially crafted request to the web server.
The 'Enter User Name' field in MP3 WAV to CD Burner version 1.4.24 is vulnerable to a buffer overflow attack. This can be exploited by pasting a large amount of data into the field, causing the program to crash or potentially execute arbitrary code.
This exploit targets the 'Enter User Name' field in My Video Converter 1.5.24. By entering a specially crafted string, it triggers a buffer overflow vulnerability, corrupting the Structured Exception Handler (SEH) chain. This can potentially allow an attacker to execute arbitrary code.
This exploit targets the 'SaveToFile()' method in the CHILKAT ASP String (CkString.dll) component, version 1.1 and below. It allows an attacker to execute arbitrary commands on the system, potentially leading to remote code execution. The vulnerability exists in all software that uses this component. The exploit takes advantage of the insecure method to create a malicious batch file ('shinnai.bat') and execute it using 'cmd.exe'.
This exploit takes advantage of a buffer overflow vulnerability in the 'Enter User Name' field of Easy AVI DivX Converter 1.2.24. By providing a specially crafted input, an attacker can overwrite the SEH (Structured Exception Handler) and gain control of the program's execution flow. This exploit has been tested on Windows 7 x64.
The 'Enter User Name' field in Easy Video to iPod/MP4/PSP/3GP Converter 1.5.20 is vulnerable to a buffer overflow, which can be exploited to execute arbitrary code.