BigAnt Server 2.50 SP1 is vulnerable to a local buffer overflow vulnerability. This vulnerability can be exploited by an attacker to execute arbitrary code on the vulnerable system. The attacker needs to open the BigAnt Console, go to the Update option, and browse to a specially crafted zip file. This will cause a buffer overflow and allow the attacker to execute arbitrary code.
NaviCOPA Web Server 3.01 is a Windows based HTTP server. This is the latest version of the application available. NaviCOPA is vulnerable to remote arbitrary source code disclosure by the following means. http://[ webserver IP]/[ file ][::$DATA] http://172.16.2.101/index.html::$DATA http://172.16.2.101/default.asp::$DATA http://172.16.2.101/index.php::$DATA
A vulnerability exists in DJ-Catalog directory Beta, which allows an attacker to inject SQL commands and gain access to sensitive information. This can be exploited by remote attackers to gain access to the database and execute arbitrary SQL commands via the 'id' and 'cid' parameters in a 'index.php' script.
iBoutique.MALL 1.2 is vulnerable to SQL injection. An attacker can exploit this vulnerability by sending malicious SQL queries to the application. This can be done by manipulating the 'cat' and 'news_id' parameters in the URL. For example, an attacker can send the following URL to the application: http://www.Cyb3r-1st.com/[path]/index.php?mod=products&cat=230+and+substring(@@version,1,1)=5. This will return the version of the database if the application is vulnerable.
DJ Studio Pro 4.2 is vulnerable to a buffer overflow vulnerability when a maliciously crafted .PLS file is loaded. The vulnerability is caused due to a boundary error when handling the file, which can be exploited to cause a stack-based buffer overflow by a maliciously crafted .PLS file. This may allow an attacker to execute arbitrary code.
BigAnt Server version 2.50 is vulnerable to SEH Overwrite vulnerability. This vulnerability can be exploited by sending a specially crafted payload to the vulnerable server. The payload contains a malicious shellcode which is executed when the SEH handler is overwritten.
A buffer overflow vulnerability exists in MP3 Collector 2.3 when a specially crafted m3u file is opened. The vulnerability is caused due to a boundary error when handling the http:// header in the m3u file. This can be exploited to cause a stack-based buffer overflow by tricking a user into opening a specially crafted m3u file.
NetAccess IP3 is a device created for high demand environments such as convention centers or hotels. It handles the Internet access and provides for instance firewalling, billing, rate-limiting as well as various authentication mechanisms. The device is administrated via SSH or a web-based GUI. An attacker can force into shell by logging into the IP3's IP address, selecting the 'ping' option (usually menu item 5), and pinging the address: localhost && sh. After four pings to localhost, shell will be forced open.
This PoC exploits a buffer overflow vulnerability in VLC Media Player versions prior to 0.9.6. The vulnerability is triggered when a specially crafted .CUE file is opened in the application. This can lead to arbitrary code execution.
A vulnerability exists in EasyMail Quicksoft 6.0.2.0 which allows remote code execution. The vulnerability is caused due to a boundary error in the processing of the 'CreateObject' method of the 'emmailstore.dll' ActiveX control. This can be exploited to cause a stack-based buffer overflow via an overly long argument passed to the 'CreateObject' method. Successful exploitation may allow execution of arbitrary code.