This vulnerability affects various controls including D-Link MPEG4 SHM Audio Control, 4xem VatCtrl Class, and RTSP MPEG4 SP Control. It allows remote overflow exploitation. The exploit can be demonstrated with DCS-5300 camera series, 4xem camera demos, and RTSP MPEG4 SP Control demo.
This exploit targets SyncBreeze version 15.2.24, a file synchronization software. By sending a specially crafted POST request to the login endpoint, an attacker can cause a denial of service (DoS) condition by overloading the server with a large payload.
This is a proof-of-concept exploit for a buffer overflow vulnerability in GOM Player version 2.3.90.5360. By providing a specially crafted input, an attacker can trigger a buffer overflow and potentially execute arbitrary code.
It is possible to induce the application to perform server-side HTTP requests to arbitrary domains. The payload d7lkti6pq8fjkx12ikwvye34ovuoie680wqjg75.oastify.com was submitted in the HTTP Host header. The application performed an HTTP request to the specified domain. For the second test, the attacker stored a response on the server with malicious content. This can be bad for a lot of users of this system if the attacker spreads a malicious URL and sends it by email etc. By using a redirect exploit.
We use the second Reflected XSS to exploit this vulnerability, create a malicious link, and steal user emails.
The exploit is a directory traversal vulnerability in the TechVIEW LA-5570 home automation controller. By accessing the system.conf file, an attacker can retrieve sensitive information, such as credentials.
Broken file upload logic. The malicious user can upload whatever he wants to an HTML file and when he tries to execute it he views almost all file paths. This could be worse than ever, it depends on the scenario.
This exploit allows an attacker to execute arbitrary operating system commands on the target system by injecting malicious commands through the 'numara' parameter in the 'send.php' endpoint.
The plugin does not filter out user-controlled URLs from being loaded into the DOM. This could be used to inject rogue iframes that point to malicious URLs.
The value of the 'language request' parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 75943";alert(1)//569 was submitted in the language parameter. This input was echoed unmodified in the application's response. The attacker can modify the token session and he can discover sensitive information for the server.