The exploit allows an attacker to execute arbitrary code by exploiting a stack overflow vulnerability in Allok RM RMVB to AVI MPEG DVD Converter version 3.6.1217. By pasting the contents of poc_seh.txt into the License Name input field, an attacker can execute the calc.exe application.
An attacker can break the database through the browser by exploiting a SQL injection vulnerability in the suggest-link.php file of the eSyndiCat Link Exchange Script. By injecting a specially crafted SQL query, the attacker can retrieve sensitive information from the database, such as usernames and passwords.
This script exploits the Citrix Directory Traversal Bug (CVE-2019-19781) by writing a file through the traversal issue and the newbm.pl script. The file location will be in /netscaler/portal/templates/filename.xml. The payload stub used in this exploit is a Python one-liner that creates a reverse shell using netcat. The payload is encoded and passed as an argument to the readpipe function in the template.new block, allowing for remote command execution on the vulnerable system.
When administrator performs a ASTPP backup in web interface (Configuration / Database Restore / Create) the file name follows a semi-predictable pattern located in /var/www/html/astpp/database_backup/. The file name can be FUZZED for data exfiltration with the following pattern: astpp_20200110080136.sql.gz
RunCMS system has multiple security vulnerabilities including Blind SQL Injection, Stored XSS, Linked XSS, Image XSS, Predictable session id, Vulnerable password changing algorithm, and many PHP Injections in the Administrator panel.
This code is a proof of concept for a local format string vulnerability in GNU sharutils version 4.2.1. The code exploits the format bugs, buffer overflows, heap and stack holes in the binary. It demonstrates three ways of exploiting the binary, but this code focuses on one method. The code also includes greetings to various individuals and groups.
This exploit allows remote attackers to execute arbitrary commands on vulnerable versions of Oracle Weblogic. The vulnerability is identified by CVE-2019-2729.
The vulnerability allows an attacker to cause a denial of service (DoS) condition by providing specially crafted input to the ZIP Password Recovery software. By creating a file with specific characters and pasting them into the 'Select Your ZIP File' field, the software crashes.
Tomcat proprietaryEvaluate/introspecthelper Sandbox Escape
The PMOS Help Desk version 2.4 and below is vulnerable to remote command execution. The vulnerability exists in the form.php file, where PHP code injection is possible. The code injection occurs in the query at line 49 or 47, allowing an attacker to inject PHP code into the 'options' table. The injected code will be executed by the eval() function in files like index.php. This vulnerability can be exploited to execute arbitrary commands on the server.