This exploit bypasses the User Account Control (UAC) using the WSReset.exe application. It creates a registry key and sets a command to be executed as the DelegateExecute value. When the WSReset.exe application is run, it executes the command with administrative privileges, bypassing the UAC.
Integard fails to sanitize input to the 'NoJs' parameter in an HTTP POST request, resulting in a stack buffer overflow that overwrites the instruction pointer, leading to remote code execution.
The exploit allows an attacker to perform remote SQL injection on the Adult Script website. By manipulating the 'id' parameter in the 'videolink_count.php' and 'links.php' pages, the attacker can retrieve sensitive information such as the admin username, password, and email. The exploit has been tested on the official demo site of Adult Script and has been found to work effectively.
The Amiti Antivirus software version 25.0.640 is vulnerable to an unquoted service path vulnerability. This vulnerability allows an attacker to escalate privileges by exploiting the way the service binary path is set. By placing a malicious executable in a specific location, an attacker can execute arbitrary code with elevated privileges.
The vulnerability exists in the 'NGDatBckpSrv' service of NETGATE Data Backup 3.0.620. The service has an unquoted service path, which could allow an attacker to gain elevated privileges and execute arbitrary code.
Firing the provided code will cause the Cisco WLC 2504 system to reload, resulting in a Denial of Service (DoS) condition.
This exploit allows an attacker to inject external entities into an XML document, potentially leading to information disclosure or denial of service.
The PHP ZLink v0.3 (go.php) script is vulnerable to SQL Injection. The script fails to properly sanitize user input in the 'id' parameter, allowing an attacker to manipulate the SQL query and extract sensitive information from the database. By crafting a specially crafted request, an attacker can bypass authentication and retrieve the usernames and passwords from the 'admin' table. This vulnerability was discovered by DNX.
This exploit allows an attacker to forge a request on behalf of a user without their knowledge or consent, potentially leading to unauthorized actions or data exposure.
The Anviz CrossChex software version 4.3.12 is vulnerable to a local buffer overflow. This vulnerability can be exploited by an attacker to execute arbitrary code or crash the software.