Waits for broadcasts from Ainz CrossChex looking for new devices, and returns a custom broadcast, triggering a stack buffer overflow.
This Perl script allows an attacker to exploit the CCMS v3.1 Demo PW vulnerability to obtain the MD5 hash of a remote user's password. The attacker needs to provide the target site, path, and user ID. The script sends a GET request to the target URL and uses a union-based SQL injection to extract the password hash from the user table. If successful, the script prints the user ID and MD5 hash.
The SOPlanning application is vulnerable to SQL Injection that leads to Remote Code Execution. Once you have extracted the admin hash, you can now use that to get command execution on the machine through another SQL Injection.
The Cuckoo Clock version 5.0 is vulnerable to a buffer overflow. By providing a specially crafted input in the 'New Alarm' textbox, an attacker can overwrite the EIP and ESP registers, allowing for the execution of arbitrary code.
The SoPlanning 1.45 application is vulnerable to CSRF that allows for arbitrary user creation and for changing passwords (Specifically the admin password)
The vulnerability allows an attacker to include a remote file in the script page load_forum.php, potentially leading to remote code execution.
An elevation of privilege vulnerability exists in the Windows Installer when MSI packages process symbolic links. An attacker who successfully exploited this vulnerability could bypass access restrictions to add or remove files.
The BOOTP Turbo software version 2.0.1214 is vulnerable to an unquoted service path vulnerability. This vulnerability could allow an attacker to escalate privileges by placing a malicious executable in the system's PATH environment variable.
The custom[client_name] and custom[company_name] parameters in the client details section of Strong Testimonials plugin in WordPress are vulnerable to stored cross-site scripting (XSS). This allows an attacker to execute malicious code on affected websites. The payload in custom[client_name] also gets executed in the All Testimonials page.
This exploit takes advantage of a bug in PHP versions 7.0-7.4, where the debug_backtrace() function returns a reference to a variable that has been destroyed, causing a Use After Free vulnerability. The exploit allows an attacker to execute arbitrary commands on the target system.