This exploit is used to gain access to the Cisco Security Agent Management Console by creating a directory tree and dropping malicious files. The malicious files include an .htaccess file to enable scripting and a backdoor file to gain command access.
This module exploits a stack buffer overflow in Video Spirit <= 1.70. When opening a malicious project file (.visprj), a stack buffer overflow occurs, resulting in arbitrary code execution. This exploit bypasses DEP & ASLR, and works on XP, Vista & Windows 7.
This module logs into the Manage Engine Appplications Manager to upload a payload to the file system and a batch script that executes the payload.
This module exploits a vulnerability found in IBM Lotus Domino iCalendar. By sending a long string of data as the 'ORGANIZER;mailto' header, process 'nRouter.exe' crashes due to a Cstrcpy() routine in nnotes.dll, which allows remote attackers to gain arbitrary code execution.
This module exploits a vulnerability found in AOL Desktop 9.6's Toolich.rct component. By supplying a long string of data in the hyperlink tag, rich.rct copies this data into a buffer using a strcpy function, which causes an overflow, and results arbitritray code execution.
A remote SQL injection vulnerability exists in K-Links software. An attacker can send a maliciously crafted request to the vulnerable server, which can be used to execute arbitrary SQL commands. The proof of concept is a maliciously crafted URL that contains an SQL injection payload. The payload is sent to the vulnerable server, which then executes the malicious SQL command.
Vallen Zipper V2.30 is vulnerable to a heap overflow vulnerability when processing specially crafted .ZIP files. An attacker can exploit this vulnerability by crafting a malicious .ZIP file and sending it to the victim, which can lead to arbitrary code execution.
MikeyZip 1.1 is vulnerable to a buffer overflow vulnerability when handling specially crafted .ZIP files. An attacker can exploit this vulnerability to execute arbitrary code in the context of the application. The vulnerability exists due to a boundary error when handling .ZIP files. A specially crafted .ZIP file can cause a buffer overflow, which can be exploited to execute arbitrary code. The vulnerability is triggered when the application opens a specially crafted .ZIP file.
The security problem in the file 'market.Php' has been created. An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable parameter 'id' in the 'market.php' file. An example of a malicious query is '-1+union+select+1,2,3,4,5,6,@@version,8,9,10,11,12,13--'
Libmodplug library is prone to a stack based buffer overflow vulnerability due to insufficient validation of user supplied data. An attacker is able to execute arbitrary code in the context of the user when opening malicious S3M media files. Vulnerability exists in ReadS3M method, vulnerable code is located in load_s3m.cpp (excerpt): WORD ptr[256];...memset(ptr, 0, sizeof(ptr));if (nins+npat){memcpy(ptr, lpStream+dwMemPos, 2*(nins+npat)); variables nins and npat are controlled by user and are read from supplied file without any validation. These parameters directly influence the amount of data to be copied, this can be uesed to overflow the stack.