This exploit allows an attacker to execute remote code without authentication in the Online Book Store 1.0 application. By uploading a PHP web shell, the attacker can gain control of the target system and execute arbitrary commands.
The AnyDesk service in version 5.4.0 has an unquoted service path vulnerability, which allows an attacker to escalate privileges by placing a malicious executable in a directory higher in the system's path than the legitimate AnyDesk executable.
This exploit allows an attacker to execute arbitrary code remotely on the Job Portal 1.0 application. The attacker can upload a PHP web shell and then execute commands on the target server.
This vulnerability allows an attacker to escalate privileges by exploiting the Core Shell COM Registrar Object in Windows. By leveraging a specific GUID, an attacker can gain elevated privileges on the system.
The MailMachine Pro 2.2.4 version is vulnerable to a remote SQL injection attack. By manipulating the 'id' parameter in the 'showMsg.php' page, an attacker can execute arbitrary SQL queries and retrieve sensitive information, such as user credentials.
The exploit creates a large buffer filled with 'A' characters and attempts to write it to a file named 'Evil.txt'. If successful, the exploit will cause the Duplicate Cleaner Pro software to crash when the content of 'Evil.txt' is pasted into the 'License key' field and the 'Activate' button is clicked.
This exploit allows an attacker to crash the Backup Key Recovery software by providing a specially crafted 'Key' value. By running a python script, a file (poc.txt) is created with a payload of 1000 'A' characters. When the software is launched and the payload is copied into the 'Key' field, the software crashes.
The Dnss Domain Name Search Software is prone to a denial-of-service (DoS) vulnerability. This allows remote attackers to crash the application by providing a specially crafted value for the 'Name' field. A proof-of-concept (PoC) exploit is provided in the form of a Python script that creates a file containing a payload of 1000 characters and causes the application to crash when the payload is copied into the 'Name' field.
This exploit allows an attacker to remotely add an administrator to the AuraCMS 2.2 system. By bypassing the 'admin_users.php' file's direct access prevention, the attacker can execute arbitrary code and gain administrative privileges. The vulnerability lies in the 'cek_login()' function, which checks the login status through session cookies and allows access to 'admin_users.php' for users with any level of login.
The Adaware Web Companion version 4.9.2159 is vulnerable to an unquoted service path vulnerability. The 'WCAssistantService' service has a binary path name that is not properly quoted. This could allow an attacker to execute arbitrary code with elevated privileges if they are able to place a malicious executable in the same directory as the service executable.