Berta CMS is a web based content management system using PHP and local file storage. Due to use of a 3rd party Berta CMS website to redirect links within a phishing email brought to our attention, we checked the file upload functionality of this software. We found that the file upload didn't require authentication. Images with a '.php' extension could be uploaded, and all that was required is that they pass the PHP getimagesize() function and have suitable dimensions. It is possible for GIF image files (and possibly other image files - not tested) to contain arbitrary PHP whilst being well enough formed to pass the getimagesize() function with acceptable dimensions. The patch requires authentication for all file uploads, which will likely resolve any similar issues.
This exploit is a stack overflow SEH overwrite vulnerability in WebGate Control Center 4.8.7. It is triggered when a maliciously crafted argument is passed to the GetThumbnail function. This causes a buffer overflow which overwrites the SEH handler and allows for arbitrary code execution.
A stack buffer overflow vulnerability exists in WebGate WinRDS WESPPlayback.WESPPlaybackCtrl.1 StopSiteAllChannel due to improper bounds checking of user-supplied input. An attacker can exploit this vulnerability to execute arbitrary code in the context of the application.
Acunetix Login Sequence Recorder (lsr.exe) Uses CoCreateInstance API From Ole32.dll To Record Target Login Sequence. Exploit Based on MS14-064 CVE2014-6332. This Python Script Will Start A Sample HTTP Server On Your Machine And Serves Exploit Code And Metasploit windows/shell_bind_tcp Executable Payload. And Finally You Can Connect To Victim Machine Using Netcat.
High-Tech Bridge Security Research Lab discovered multiple vulnerabilities in web interface of pfSense, which can be exploited to perform Cross-Site Scripting (XSS) attacks against administrator of pfSense and delete arbitrary files via CSRF (Cross-Site Request Forgery) attacks. Successful exploitation of the vulnerabilities may allow an attacker to delete arbitrary files on the system with root privileges, steal administrator’s cookies and gain complete control over the web application and even the entire system, as pfSense is running with root privileges and allows OS command execution via its web interface.
A stack buffer overflow vulnerability exists in WebGate eDVR Manager WESPMonitor.WESPMonitorCtrl LoadImage function. An attacker can exploit this vulnerability to execute arbitrary code on the target system by sending a specially crafted request containing an overly long string.
This module allows you to inject unix command with the same user who runs the http service - admin - directly on the QNAP system. Affected products: All Turbo NAS models except TS-100, TS-101, TS-200.
RM Downloader v2.7.5.400 is vulnerable to a local buffer overflow vulnerability. An attacker can exploit this vulnerability by sending a specially crafted RAM file to the application. This will cause a buffer overflow and allow the attacker to execute arbitrary code on the vulnerable system.
Mini-sream Ripper v2.7.7.100 is vulnerable to a local buffer overflow vulnerability. An attacker can exploit this vulnerability by crafting a malicious M3U file and sending it to the victim. When the victim opens the malicious M3U file, a message box will be displayed, allowing the attacker to execute arbitrary code on the victim's system.
This vulnerability is a use-after-free vulnerability in Adobe Flash Player that allows attackers to execute arbitrary code on the target system. The vulnerability was discovered in the Angler Exploit Kit and was used in malvertisements. It affects Adobe Flash Player versions up to 16.0.0.296 and earlier.