This exploit takes advantage of a local buffer overflow vulnerability in UltraISO version 9.7.1.3519. By generating a specially crafted exploit.txt file and pasting its contents under 'Output FileName' in the application, an attacker can execute arbitrary code on the target system.
This exploit takes advantage of a local buffer overflow vulnerability in R i386 version 3.5.0. By pasting the exploit code in the 'Gui Preferences' section of the application, an attacker can execute arbitrary code, in this case opening the calculator. The exploit uses a SEH exploitation method and has been tested on Windows XP Prof SP3 ENG x86.
This exploit allows an attacker to execute arbitrary code by exploiting a buffer overflow vulnerability in 10-Strike Network Inventory Explorer version 8.54. By creating a specially crafted file and opening it in the application, an attacker can trigger the vulnerability and gain control over the target system. This exploit bypasses DEP (Data Execution Prevention) by manually creating a ROP (Return Oriented Programming) chain. The exploit was originally discovered by Hashim Jawad and the proof of concept code was published on Exploit Database (EDB: 44838).
The SQL injection vulnerability exists in Rukovoditel Project Management CRM 2.4.1. It can be exploited by a logged-in user through the global list tab by creating a new list and applying SQL injection.
The Sniper-Sa.com exploit is a vulnerability in an unspecified software. The exploit allows an attacker to execute arbitrary code by injecting a malicious payload through a vulnerable parameter in the victim's website. The exact details of the vulnerability and its impact are not provided in the given text.
This exploit targets a buffer overflow vulnerability in HTML5 Video Player 1.2.5. By pasting a specially crafted payload into the 'KEY CODE' field under the 'Register' section of the application, an attacker can trigger a buffer overflow and execute arbitrary code. This exploit does not require SEH exploitation. The exact details of the vulnerability are yet to be determined by Mitre.
The 'collection_edit.php' page in ResourceSpace version 8.6 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by injecting malicious SQL code through the 'keywords' parameter.
The Mess Management System 1.0 is vulnerable to SQL Injection. By manipulating the 'id' parameter in the 'admin_form' module, an attacker can execute arbitrary SQL queries.
Input passed to the "id" parameter in profiles-codes, video-codes, and arcade-games modules is not properly verified before being used to sql query. This can be exploited thru the browser and get the hash md5 password from users.
The Faleemi Desktop Software 1.8 is vulnerable to a local buffer overflow, which can be exploited to bypass DEP and gain control of the system. By opening the software and pasting specific contents into a field, an attacker can execute arbitrary code and pop a calculator.