This is a buffer overflow exploit for OtsTurntables Free v1.00.047 (.olf) file. The exploit allows an attacker to execute arbitrary code on the target system by sending a specially crafted .olf file.
This is a local buffer overflow exploit in UltraISO. The exploit takes advantage of a buffer overflow vulnerability in the software to execute arbitrary code. The overflow occurs when parsing a CCD file with a specific structure. By crafting a CCD file with a payload, an attacker can overwrite the return address and gain control of the program flow. This exploit is a proof-of-concept (0day) and can be used to demonstrate the vulnerability.
This exploit allows an attacker to upload a PHP shell through the TinyMCE plugin in Joomla 1.5.12, leading to remote code execution. The attacker can then execute arbitrary commands on the target system.
This exploit allows an attacker to execute arbitrary code on a vulnerable system running DJ Studio Pro version 5.1.6.5.2. By exploiting a buffer overflow vulnerability, the attacker can overwrite the Structured Exception Handler (SEH) and gain control of the program's execution flow. This exploit specifically executes the calc.exe program, but it could be modified to execute any other malicious code.
The exploit involves injecting malicious SQL code into a new event's description. The code retrieves the username and email of a user with a specific group ID from the #__users table. The user ID must be provided as part of the exploit. The extracted information can be found on the View Events page.
This Proof-of-Concept (PoC) demonstrates a cross-platform vulnerability that allows the creation and execution of files. On Windows, it creates the file c:booom.bat and launches it, which opens a command prompt with a dir command. On Linux and MacOSX, it creates the file ~/booom.txt or /booom.txt. In some cases, the script might run twice, resulting in an additional booom-1.txt file.
SQL Injection vulnerability exists in the Human Resource Management System (HRM) application. An unauthenticated attacker can exploit this vulnerability by sending a specially crafted POST request to the login page of the application. The attacker can then use the sqlmap tool to exploit the vulnerability and gain access to the database.
The plugin WP All Import is vulnerable to arbitrary file uploads due to missing file type validation via the wp_all_import_get_gz.php file in versions up to, and including, 3.6.7. This makes it possible for authenticated attackers, with administrator level permissions and above, to upload arbitrary files on the affected sites server which may make remote code execution possible.
The application is vulnerable to DOM-based cross-site scripting attacks. Data is read from `location.hash` and passed to `jQuery.parseHTML`. The attacker can use this vulnerability to create an unlimited number of accounts on this system until it crashed.
The `keywords` parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the keywords parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. The injection is confirmed manually from nu11secur1ty. The attacker can retrieve all information from the database of this system, by using this vulnerability.