This exploit allows an attacker to add a new administrator user to the ManageEngine EventLog Analyzer Version 10.0. The attacker can craft a malicious HTML page with a form that contains hidden fields with values that will be used to add a new administrator user. When the victim visits the malicious page, the form will be automatically submitted and the new administrator user will be added.
A local file include web vulnerability has been discovered in the official OYO File Manager v1.1 iOS & Android mobile web-application. The file include vulnerability allows remote attackers to unauthorized include local file/path requests to compromise the mobile web-application.
Elasticsearch before 1.4.5 and 1.5.x before 1.5.2 allows remote attackers to read arbitrary files via unspecified vectors when a site plugin is enabled.
This vulnerability allows an attacker to gain access to the I/O ports of a system, which can be used to gain access to privileged information or to execute malicious code. The vulnerability is caused by the use of the iopl() function in the code, which allows an attacker to gain access to the I/O ports of a system. The code also contains a loop that can be used to push data into the FIFO register, which can be used to gain access to privileged information or to execute malicious code.
This exploit is a local privilege escalation vulnerability in the NtOpenFile Struct function in Windows. It allows an attacker to gain SYSTEM privileges by sending a malicious IOCTL to the CNG device. This vulnerability was discovered by NTarakanov and was assigned CVE-2015-0057.
This exploit triggers a denial of service condition within the Openlitespeed web server. This is achieved by sending a tampered request contain a large number (91) of 'a: a' header rows. By looping this request, a memmove call within the HttpReq class is triggered with a freed pointer, resulting in a reference to an invalid memory location and thus a segmentation fault.
Chronosite 5.12 is vulnerable to SQL injection. An attacker can exploit this vulnerability by sending a crafted HTTP request with malicious SQL query to the vulnerable application. This can allow the attacker to gain access to sensitive information from the database.
This exploit is a proof-of-concept code for a local privilege escalation vulnerability in the Windows kernel. It was discovered by FireEye researchers and used in an APT attack. The exploit is based on a race condition in the win32k.sys system call NtUserSetWindowLongPtr() which can be abused to gain SYSTEM privileges.
iFTP 2.21 is vulnerable to a buffer overflow when a long string is sent to the 'Host Address' field. This can be exploited to cause a crash when the user attempts to connect to the malicious host.
This module exploits a serialization flaw in MovableType before 5.2.12 to execute arbitrary code. The default nondestructive mode depends on the target server having the Object::MultiType and DateTime Perl modules installed in Perl's @INC paths. The destructive mode of operation uses only required MovableType dependencies, but it will noticeably corrupt the MovableType installation.