This exploit uses multiple vulnerabilities in multiple versions of PEEL CMS to try to spawn a Remote Upload File. It extracts admin hash and performs remote upload.
This exploit targets CA BrightStor ARCserve Backup r11.5 by exploiting a buffer overflow vulnerability in the AddColumn() function of the ListCtrl.ocx ActiveX control. By sending a specially crafted request, an attacker can trigger a remote buffer overflow and execute arbitrary code on the target system.
The Crysis engine passes along internal debug strings through the game, and one of them is passed to the vsprintf() function in the crt lib. This vulnerability can be exploited by sending a specially crafted format string as input, which can lead to remote code execution or denial of service.
This exploit allows you to login to ICQ server using any account registered locally, no matter the 'save password' option is checked or not. High-level security is also bypassed. All you have to do is run the exploit and set the status property using your mouse when the flower is yellow. If you accidentally set the status to offline then you will need to restart ICQ and run the exploit again.
This vulnerability affects various controls including D-Link MPEG4 SHM Audio Control, 4xem VatCtrl Class, and RTSP MPEG4 SP Control. It allows remote overflow exploitation. The exploit can be demonstrated with DCS-5300 camera series, 4xem camera demos, and RTSP MPEG4 SP Control demo.
This exploit targets SyncBreeze version 15.2.24, a file synchronization software. By sending a specially crafted POST request to the login endpoint, an attacker can cause a denial of service (DoS) condition by overloading the server with a large payload.
This is a proof-of-concept exploit for a buffer overflow vulnerability in GOM Player version 2.3.90.5360. By providing a specially crafted input, an attacker can trigger a buffer overflow and potentially execute arbitrary code.
It is possible to induce the application to perform server-side HTTP requests to arbitrary domains. The payload d7lkti6pq8fjkx12ikwvye34ovuoie680wqjg75.oastify.com was submitted in the HTTP Host header. The application performed an HTTP request to the specified domain. For the second test, the attacker stored a response on the server with malicious content. This can be bad for a lot of users of this system if the attacker spreads a malicious URL and sends it by email etc. By using a redirect exploit.
We use the second Reflected XSS to exploit this vulnerability, create a malicious link, and steal user emails.
The exploit is a directory traversal vulnerability in the TechVIEW LA-5570 home automation controller. By accessing the system.conf file, an attacker can retrieve sensitive information, such as credentials.