This is a proof-of-concept exploit for a remote buffer overflow vulnerability in nipper-ng version 0.11.10. The vulnerability was found by Guy Levin and can be exploited by sending a specially crafted shell command. The exploit uses a buffer overflow to overwrite the return address and gain control of the program execution flow. The vulnerability is tracked as CVE-2019-17424.
The parameter "value" is vulnerable to Stored Cross-site scripting.
The Foscam Video Management System 1.1.4.9 is vulnerable to a denial of service (DoS) attack. By sending a specially crafted username, an attacker can cause the application to crash, resulting in a denial of service condition.
This exploit allows an attacker to add an admin user to the TemaTres 3.0 web application by bypassing authentication.
This exploit allows an attacker to include local files on the server by manipulating the 'global_lang' parameter in various PHP files. By injecting a local file path and the null byte (%00) at the end of the parameter, the attacker can access sensitive files on the server.
The Centova Cast 3.2.11 version is vulnerable to an arbitrary file download attack. An attacker can exploit this vulnerability to download arbitrary files from the server without authentication. This can lead to unauthorized access to sensitive information or system compromise.
The NCP_Secure_Entry_Client version 9.2 for Windows has unquoted service paths, which could allow an attacker to escalate privileges and execute arbitrary code.
The Crystal Live HTTP Server 6.01 is vulnerable to directory traversal. By sending a specially crafted GET request, an attacker can access files outside the web root directory.
The exploit involves sending a specially crafted password to the Open Proficy HMI-SCADA application, causing it to crash and become unresponsive.
The application suffers from an unquoted service path issue impacting the service 'ASUS HM Com Service (aaHMSvc.exe)' related to the Asus Motherboard Utilities. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with system privileges.