A vulnerability in bash allows inadvertently running commands embedded in the path to the currently working directory. If an unsuspecting user enters a directory created by some malicious user with embedded commands, and their prompt (PS1) contains 'w' or 'W', and the prompt is displayed, the commands will be executed. The vulnerability is in the parsing of the 'w' and 'W' escape codes. As the prompt must be displayed unattended shell scripts are not vulnerable.
This PoC demonstrates a memory corruption vulnerability in PEamp when playing a specially crafted .mp3 file. When the file is added and played in PEamp, a MCI Error Message Box is displayed. Clicking OK or closing the MessageBox will cause the program to crash.
Multiple parameters in FreeNAC version 3.02 are vulnerable to reflective cross-site scripting. The affected parameters are comment, mac, graphtype, type, and name. An attacker can inject malicious scripts into these parameters, which can be executed in the user's browser. This can lead to various attacks such as stealing sensitive information, session hijacking, or defacing the website.
The vulnerability occurs during the handling of MP4 files. Some values are read from the file and divided, resulting in a crash. By modifying certain bytes in the file, the crash can be triggered.
This exploit targets a memory corruption vulnerability in LibreOffice 3.5.2.2. The author provides a detailed description of the exploit and its impact.
A Buffer Overflow vulnerability is detected on BulletProof FTP Client v2010.75.0.76. The vulnerability is located in the main executeable bpftpclient.exe. During the start of the application the value LogFileName from the registry key [HKEY_CURRENT_USER/Software/BulletProof Software/BulletProof FTP Client 2010/Options] is read. When inserting an oversized value to the registry value a buffer overflow is triggered. The victim only needs to start the application.
A hard one this, the shellcode MUST be lowercase. Plus there are many opcode's that break the payload and opcodes that gets changed, like "xc3" gets converted to "xe3", and "xd3" gets converted to "xf3"
This module exploits a vulnerability in Dell Webcam's CrazyTalk component. Specifically, when supplying a long string for a file path to the BackImage property, an overflow may occur after checking certain file extension names, resulting in remote code execution under the context of the user.
A Buffer Overflow Vulnerability is detected on FlashFXPs Software Client v4.1.8.1701. The vulnerability is located when processing to force a ListIndex Out of Bound(s) exception which allows to overwrite ecx & eip of the affected software process. Successful exploitation can result in process compromise.
This exploit allows an attacker to execute arbitrary code on a Sysax Multi Server version 5.53 after authentication. The exploit takes advantage of a buffer overflow vulnerability in the software.