This module exploits a heap overflow found in InduSoft Web Studio <= 61.6.00.00 SP6. The overflow exists in the ISSymbol.ocx, and can be triggered with a long string argument for the InternationalSeparator() method of the ISSymbol control. This modules uses the msvcr71.dll form the Java JRE6 to bypass ASLR.
Multiple persistent input validation web vulnerabilities are detected in the Enterpriser16 v7.1 Load Balancer Application. The bug allows remote attackers to implement/inject own malicious script code on the application side (persistent) of the service. The first vulnerabilities are located in the `Edit Configuration` module with the bound vulnerable Label, Virtual Host, Request to send, Email Alerts and Response expected parameters. The secound vulnerabilities are located in the Create Solution, Access points and New Contract module with the bound vulnerable title, asset name, contract name, name or description parameter requests. Exploitation requires low user interaction and a low privileged application user account. Successful exploitation of the vulnerability can lead to persistent session hijacking (manager/admin), persistent phishing or persistent module web context manipulation.
A persistent POST Injection (input validation) vulnerability is detected in the official DELL Sonicwall SonicOS v5.8.1.8 Firewall Series Appliance Application. The vulnerability typus allows an attacker to inject via POST request own malicious script code in the vulnerable module on application side (persistent).
A buffer overflow vulnerability exists in DIMIN Viewer 5, which is caused by improper bounds checking of user-supplied data. An attacker can exploit this vulnerability by sending a specially crafted file to the vulnerable application. This can result in arbitrary code execution in the context of the application.
A file upload vulnerability was discovered in Clockstone WordPress Theme & Various CMSMasters Themes, which allowed anyone to access a victim's site, by uploading whatever files they wanted to the site. The code that allowed this attack to happen, was in several files which did not require user authentication from logged in WordPress users, and anyone visiting the url directly would be able to execute the script directly.
This module exploits a heap based buffer overflow in the CrystalPrintControl ActiveX, while handling the ServerResourceVersion property. The affected control can be found in the PrintControl.dll component as included with Crystal Reports 2008. This module has been tested successfully on IE 6, 7 and 8 on Windows XP SP3 and IE 8 on Windows 7 SP1. The module uses the msvcr71.dll library, loaded by the affected ActiveX control, to bypass DEP and ASLR.
The vulnerability cause a Memory corruption via a specially crafted Flv files. Successful exploits can allow attackers to execute arbitrary code.
Multiple remote code execution bugs exist in phpwcms for quite some time now. In order to exploit the vulnerabilities, an attacker will need to have access to an authenticated account as either a "backend user", "admin user" or "frontend / backend user". The only account that cannot exploit these vulnerabilities is the "frontend user". Examples of the exploit include lines 699-700, 704, 708, 792 and 807 of ./include/inc_front/content.func.inc.php.
The vulnerability cause a stack corruption (division by zero) via a specially crafted Avi files That will trigger a denial of service condition.
The Profile Skype ID MyBB Plugin is vulnerable to stored XSS. An attacker can inject malicious JavaScript code into the Skype ID field of a user profile. When a user visits the profile, the malicious code will be executed in the user's browser.