This exploit creates a Denial of Service (DoS) attack on Nsauditor version 3.1.8.0. It involves creating a file with a payload that causes the software to crash when the content of the file is pasted into the 'Key' field during registration.
The Dokuwiki version 2018-04-22b 'Greebo' allows for username enumeration through the 'set new password' page. By testing for non-valid usernames, it is possible to determine whether a user exists in the database. The vulnerability can be exploited by sending a POST request to the /doku.php?id=start&do=resendpwd endpoint.
This Perl script exploits a vulnerability (CVE-2006-4343) in SSL servers, where a specially crafted SSL serverhello response can cause the SSL client to crash.
This exploit allows an attacker to create a file with a large buffer and crash the SpotAuditor software by pasting the characters from the file into the 'Name' field.
Stored XSS has been discovered in the Online Inventory Manager created by bigprof/AppGini. The vulnerability exists in the editgroups section where an attacker can inject malicious JavaScript code into the description field. This code will be executed when viewing the groups page. The vulnerability also exists when creating a new group.
The 'CCSrvProxy' service in TexasSoft CyberPlanet 6.4.131 has an unquoted service path vulnerability, which could allow an attacker to escalate privileges and execute arbitrary code.
The SpotAuditor 5.3.2 software is vulnerable to a denial of service attack when a specially crafted 'Key' value is provided. By supplying a large number of characters, the software crashes. This vulnerability allows an attacker to disrupt the normal functioning of the software.
This will exploit an (authenticated) blind OS command injection vulnerability present in Solstice devices running versions of the firmware prior to 2.8.4.
With GHIA CamIP you can view your cameras in real time supports conventional IPC cameras, cameras with alarm, Video intercom and other devices. The vulnerability allows an attacker to crash the application by pasting a specific content in the 'Password' field.
This exploit allows an attacker to perform a remote SQL injection attack on zBlog v1.2. By manipulating the 'page' parameter in the URL, an attacker can inject SQL commands and retrieve sensitive information from the database, such as admin credentials. The vulnerability exists in the 'categ' and 'article' parameters.