This exploit code creates a file 'exploit.txt' with a large amount of junk data (6000 bytes). When this file is copied and pasted into the Unlock Code field of the Easy MP3 Downloader application, it causes the application to crash.
The Jobberbase 2.0 CMS is vulnerable to SQL Injection in the 'jobs-in' parameter. By injecting a specially crafted payload, an attacker can manipulate the SQL query and potentially gain unauthorized access to the database.
The Adult Script software is vulnerable to unauthorized administrative access. The vulnerability can be exploited by an attacker to gain unauthorized access to the administrative panel of the software. The vulnerable code is located in the 'admin/administrator.php' file, near lines 5-8. The code checks if the 'adminid' session variable is empty and if the 'admintype' session variable is not equal to 1. If both conditions are true, the code redirects the user to the 'logout.php' page. However, there is no authentication or authorization check before this redirection, allowing an attacker to bypass the login process and gain administrative access.
Multiple security bugs in Hosting Controller allow a remote attacker to gain full system administrator access. The attacker can login to the hosting controller panel, change passwords, execute commands with administrative privilege, create new users, change user profiles, perform SQL injection to access database information, manipulate credit amounts and discounts, uninstall FrontPage extensions, delete gateway information, enable or disable payment types, reveal usernames, find hosting controller setup directory, import unwanted plans, find web site path, and enable or disable forums. These vulnerabilities can be exploited by unauthorized users and users with simple accounts.
This is a remote proof-of-concept exploit for the Mdaemon IMAP server v6.5.1 and possibly other versions. It utilizes a buffer overflow vulnerability.
A vulnerability exists in Nagios XI <= 5.6.5 allowing an attacker to leverage an RCE to escalate privileges to root. The exploit requires access to the server as the 'nagios' user, or CCM access via the web interface with permissions to manage plugins. The getprofile.sh script, invoked by downloading a system profile (profile.php?cmd=download), is executed as root via a passwordless sudo entry; the script executes the ‘check_plugin’ executable which is owned by the nagios user A user logged into Nagios XI with permissions to modify plugins, or the 'nagios' user on the server,can modify the ‘check_plugin’ executable and insert malicious commands exectuable as root.
LibreOffice comes bundled with sample macros written in Python and allows the ability to bind program events to them. LibreLogo is a macro that allows a program event to execute text as Python code, allowing RCE. This module generates an ODT file with a dom loaded event that, when triggered, will execute arbitrary python code and the metasploit payload.
The vulnerability allows remote attackers to disclose sensitive information by exploiting the filedownload.php script. By manipulating the 'file' parameter, an attacker can access arbitrary files on the server, such as config.inc.php or /etc/passwd.
filemgr.php in Integria IMS 5.0.86, allows arbitrary file upload.
A buffer overflow vulnerability in GetGo Download Manager 6.2.2.3300 and earlier could allow Remote NAS HTTP servers to perform DoS via a long response.