Unquoted service paths in BlackMoon FTP Server versions 3.1.2.1731 'BMFTP-RELEASE' have an unquoted service path. A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.
This vulnerability is in the validation mode and is located in the Preview of new post inside soliloquy. The vulnerability occurs when a user inserts a script tag in the title input and saves the post. The vulnerability is triggered when the target clicks on the preview of the post.
This vulnerability is in the validation mode and is located in the plugin settings panel. The vulnerability type is stored and it happens because in the settings there is a select tag with options. By breaking the option and writing a script tag, an attacker can execute arbitrary code.
The Mikogo-Service in Mikogo 5.2.2.150317 allows local users to gain privileges via an unquoted service path vulnerability.
This exploit allows an attacker to execute arbitrary code on a system running jetAudio 7.0.5 COWON Media Center MP4. The vulnerability is caused by a stack overflow in the AVI file parser of the media player. By crafting a malicious AVI file and playing it with COWON Media Center, an attacker can trigger the stack overflow and execute arbitrary code with the privileges of the user running the media player. This exploit has been tested on Windows XP SP2 ENG and provides a shell on port 49152.
The LiteManager 4.5.0 software has an unquoted service path vulnerability in the 'romservice' service. This vulnerability allows an attacker with local access to escalate privileges and potentially execute arbitrary code.
The Zilab Remote Console Server 3.2.9 software installs a service called 'zrcs' with an unquoted service path. This vulnerability can allow an attacker to escalate privileges and execute arbitrary code.
The ActiveFax Server 6.92 Build 0316 software has an unquoted service path vulnerability. This vulnerability could allow an attacker to escalate privileges and execute arbitrary code by placing a malicious executable in the path.
This exploit allows an attacker to perform Cross-Site Request Forgery attacks on Bolt CMS version 3.6.10. The attacker can create folders and files on the target system.
This exploit triggers a heap overflow vulnerability in the GDIPLUS.DLL file on Windows XP systems. By creating a crafted JPEG file, an attacker can execute arbitrary code with elevated privileges, creating a new user in the Administrators group. The exploit has been tested on Windows XP Professional English SP1 (GDIPLUS.DLL version 5.1.3097.0) and Windows XP Professional Italian SP1 (GDIPLUS.DLL version 5.1.3101.0). Note that Windows XP SP2 is not vulnerable to this exploit.