The websihirbazi v5.1.1 script is vulnerable to a remote blind SQL injection attack. An attacker can exploit this vulnerability to extract sensitive information from the database.
AppXSvc improperly handles file hard links resulting in a low privileged user being able to overwrite an arbitrary file leading to elevation of privilege.
The mmsLamp application is vulnerable to SQL injection. An attacker can manipulate the 'idpro' parameter in the 'default.php' script to execute arbitrary SQL queries. This can lead to unauthorized access, data leakage, or even remote code execution.
This exploit targets a local buffer overflow vulnerability in SpotAuditor 5.3.2. By sending a specially crafted payload, an attacker can overwrite the Structured Exception Handler (SEH) and gain control of the program's execution flow.
This exploit allows an attacker to bypass authentication in the administration panel of PRO-7070 Hazir Profesyonel Web Sitesi 1.0. By using the username '=' 'or' and password '=' 'or', the attacker can gain unauthorized access to the panel.
This exploit demonstrates a UAC bypass technique by mocking trusted directories. It utilizes wsreset.exe to execute arbitrary code with elevated privileges.
This exploit bypasses the User Account Control (UAC) using the WSReset.exe application. It creates a registry key and sets a command to be executed as the DelegateExecute value. When the WSReset.exe application is run, it executes the command with administrative privileges, bypassing the UAC.
Integard fails to sanitize input to the 'NoJs' parameter in an HTTP POST request, resulting in a stack buffer overflow that overwrites the instruction pointer, leading to remote code execution.
The exploit allows an attacker to perform remote SQL injection on the Adult Script website. By manipulating the 'id' parameter in the 'videolink_count.php' and 'links.php' pages, the attacker can retrieve sensitive information such as the admin username, password, and email. The exploit has been tested on the official demo site of Adult Script and has been found to work effectively.
The Amiti Antivirus software version 25.0.640 is vulnerable to an unquoted service path vulnerability. This vulnerability allows an attacker to escalate privileges by exploiting the way the service binary path is set. By placing a malicious executable in a specific location, an attacker can execute arbitrary code with elevated privileges.