Microsoft Windows Task Scheduler is vulnerable to a stack-based buffer overflow. The flaw can be exploited by creating a specially-crafted .job file. This will most frequently be a local exploit, but it is possible to imagine some cases where this could be remotely exploited as well.
8a91f17d4a2fd2983c074e04a451428f0f826e5f1059013c4a6a38db1aee67e2
Microsoft Windows XP Task Scheduler (.job) universal exploit with portbind and connectback shellcode. Tested against Internet Explorer 6.0 (SP1), Explorer, and Windows XP SP0, SP1.
c0ad2fbcb9aafe3a76b903dc7caa191f29e0d66022d31612c07ee0125af77dc4
Microsoft Windows 2K/XP Task Scheduler local exploit that will spawn notepad.exe.
20e1631372e049c682c8f434c7e218433de0a741f529452b367684f45b732aee