SEH based Buffer Overflow in the Username field of a valid session. This exploit generates a malicious MobaXterm sessions file. When the user double clicks in the session, the shellcode is going to be executed. You need to adapt the exploit to your current OS Windows version.
There is a security flaw on the comment section, which allows to make persistent XSS without any authentication. An attacker could use this flaw to gain cookies to get into an account of registered users.
This vulnerability is in the validation mode and is located in the plugin management panel. The vulnerability allows an attacker to inject malicious script code in various fields, such as 'Title prefix', 'Title suffix', 'Increase menu order by', and 'Do not copy these fields'. By saving the changes, the payload will execute.
Any registered user can upload files and rename and change the file type to php5 or php7 by ckeditor module in my files section.
This module attempts to gain root privileges on RHEL systems with a vulnerable version of Automatic Bug Reporting Tool (ABRT) configured as the crash handler. `sosreport` uses an insecure temporary directory, allowing local users to write to arbitrary files (CVE-2015-5287). This module uses a symlink attack on `/var/tmp/abrt/cc-*$pid/` to overwrite the `modprobe` path in `/proc/sys/kernel/modprobe`, resulting in root privileges. Waiting for `sosreport` could take a few minutes. This module has been tested successfully on: abrt 2.1.11-12.el7 on RHEL 7.0 x86_64; and abrt 2.1.11-19.el7 on RHEL 7.1 x86_64.
This is a proof of concept (PoC) exploit for a heap overflow vulnerability in the WFTPD Explorer Pro 1.0 software. The exploit allows an attacker to overwrite a register in the application's memory, causing an access violation (c0000005). The exploit uses a crafted payload to trigger the vulnerability.
The vulnerability allows an attacker to include a remote file on the vulnerable server by exploiting the 'uploadgames.php' script in the MySpace Content Zone. By uploading a malicious shell and accessing it through the 'thumb' directory, an attacker can gain unauthorized access to the server.
This exploit allows an attacker to cause a denial of service (crash) in SpotIE Internet Explorer Password Recovery 2.9.5. By providing a long string as the 'Key' parameter, the application crashes. This vulnerability can be exploited by running a Perl script provided by the author and following the steps outlined in the script.
The 'datum1' parameter in the DIGIT CENTRIS 4 ERP software is vulnerable to SQL injection attacks. An attacker can manipulate the 'datum1' parameter to execute arbitrary SQL queries on the underlying database.
This is a macOS Kernel Exploit for an undisclosed CVE. The KASLR slide and disabled SMAP are required to use this exploit. It is not exploitable on Macs after 2015. This exploit is intended for security research purposes only.