This exploit takes advantage of a buffer overflow vulnerability in NetOp Remote Control software versions 8.0, 9.1, 9.2, and 9.5. It allows an attacker to execute arbitrary code on a target system. The vulnerability is caused by a lack of proper input validation in the software's handling of certain files. By sending a specially crafted file, an attacker can trigger a buffer overflow and overwrite critical memory, leading to code execution. The exploit includes a payload that establishes a reverse TCP shell connection to the attacker's machine. This allows the attacker to gain remote access to the target system.
The Quick CMS v3.0 is vulnerable to cross-site request forgery (XSRF) attack which allows an attacker to add an admin user without warning. The exploit code is provided in the text.
This is a buffer overflow exploit for FirstClass Desktop 7.1. It allows an attacker to execute arbitrary code by overflowing a buffer in the application. The exploit is discovered and coded by I2S-LaB.
The ElonFmt ActiveX Control Module suffers from a buffer overflow vulnerability. When a large buffer is sent to the pid item of the GetItem1 function in elonfmt.ocx module, we get a few memory registers overwritten including the SEH. An attacker can gain access to the system on the affected node and execute arbitrary code.
The CSRF vulnerability exists in the 'pass.php' script of the Dalbum product, which fails to properly verify the source of HTTP requests. An attacker can exploit this vulnerability by using a browser and submitting a crafted form. The XSS vulnerability exists in the 'editini.php' script, which fails to properly sanitize user-supplied input in the 'url' variable, allowing the execution of arbitrary JavaScript code.
The IBM Tivoli Directory Server (ITDS) is vulnerable to remote code execution through the SASL bind request. This vulnerability allows an attacker to execute arbitrary code on the target system, potentially compromising the entire server. It affects the Windows platform.
This module exploits a stack buffer overflow in Wireshark <= 1.4.4 When opening a malicious .pcap file in Wireshark, a stack buffer occurs, resulting in arbitrary code execution. This exploit bypasses DEP & ASLR and works on XP, Vista & Windows 7.
EZ-Shop is prone to SQL Injection due to insufficient user supplied input sanitization.
This vulnerability allows for an endless loop affecting all the services that use the TCP protocol, as well as the snabase.exe service on port 1478, snalink.exe on their dynamic ports, snaservr.exe, and mngagent.exe. The cause of this vulnerability is the 'word[packet] - 2' code, which forces continuous parsing of the same data. There are also other Denial of Service vulnerabilities that affect the UDP protocol used in snabase.exe on port 1478. When this service terminates, other services depending on it, such as snalink and msngagent, will also terminate.
This module takes advantage of a trust relationship issue within the Zend Server Java Bridge. The Java Bridge is responsible for handling interactions between PHP and Java code within Zend Server. When Java code is encountered Zend Server communicates with the Java Bridge. The Java Bridge then handles the java code and creates the objects within the Java Virtual Machine. This interaction however, does not require any sort of authentication. This leaves the JVM wide open to remote attackers. Sending specially crafted data to the Java Bridge results in the execution of arbitrary java code.