This exploit allows remote attackers to execute arbitrary PHP code on the target system.
A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.
The HomeGuard Pro version 9.3.1 has insecure folder permissions which allows BUILTINUsers to have full control over the 'C:Program FilesHomeGuard Pro' folder. Additionally, the files and services within the folder also have insecure permissions, allowing BUILTINUsers to have full control over them.
The vulnerability allows remote attackers to upload arbitrary files to the server.
This is a buffer overflow exploit for the Persits Software XUpload Control AddFolder() function. It allows an attacker to execute arbitrary code on a vulnerable system. The exploit contains two shellcode payloads, one for executing calc.exe and another for establishing a bind shell on port 4444.
The HP System Event service "HPMSGSVC.exe" will load an arbitrary EXE and execute it with SYSTEM integrity. HPMSGSVC.exe runs a background process that delivers push notifications. The problem is that HP Message Service will load and execute any arbitrary executable named "Program.exe" if found in the users c: drive. This results in arbitrary code execution persistence mechanism if an attacker can place an EXE in this location and can be used to escalate privileges from Admin to SYSTEM.
This exploit takes advantage of a buffer overflow vulnerability in MyVideoConverter Pro version 3.14. By providing a specially crafted input to the 'TVSeries' field, an attacker can overwrite the program's stack and execute arbitrary code.
The exploit allows an attacker to execute arbitrary code by overflowing the 'Output Folder' field in MyVideoConverter Pro 3.14. By providing a specially crafted input, an attacker can overwrite the program's stack and control the execution flow, leading to remote code execution.
The exploit script creates a new file with the name 'Shell.txt' and copies the content inside. Then, when the program is started and the 'Movie' option is selected, the content of 'Shell.txt' is pasted into the 'Video Folder' field, resulting in the execution of the calculator.
This exploit allows an attacker to execute arbitrary commands on a target Sharepoint server. The attacker needs to provide the URL of the Sharepoint Picker.aspx page and the command to run. The exploit can also read the command from a file.