This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. Authentication is not required to exploit this vulnerability. The specific flaw exists within the FindText() method of the MSHTML library. The issue lies in the improper validation of user-supplied data which can result in a stack-based buffer overflow. An attacker can leverage this vulnerability to execute code under the context of the current process.
PBBoard 2.1.1 is vulnerable to remote code execution, SQL injection and XSS. An attacker can upload a malicious shell with a GIF89a header to execute arbitrary code on the server. SQL injection can be performed by inserting a single quote (') in all % variables in the script. XSS can be performed by inserting a malicious script in the URL. An attacker can also gain access to the admin panel by using SQL injection in the username field.
MySQL error based injection method can be used to exploit PEEL eCommerce Premium v5.71. Hex Conversion is needed for exploitation. An attacker can use the injection to get the database name and table numbers. An example of a limit command can be used to get the table name.
Gokhun ASP Stok v1.0 is vulnerable to multiple remote vulnerabilities such as SQL Injection, Cross Site Scripting and Remote Database Disclosure. An attacker can exploit these vulnerabilities to gain unauthorized access to the database and execute malicious code on the vulnerable system.
This exploit allows an attacker to reset the admin password of Zenphoto Image Gallery 1.3 by sending malicious POST requests to the setup.php file. The attacker can also upload malicious PHP files to the target server by editing the themes tab.
E-Xoopport is a web application that is vulnerable to a Remote Blind SQL Injection vulnerability in its eCal module. This vulnerability allows an attacker to gain access to the application's database and extract sensitive information. The exploit is written in Perl and requires the attacker to have access to the eCal module. The exploit is triggered by sending a specially crafted HTTP request to the application.
VisualSite CMS version 1.3 has multiple vulnerabilities, including a logical bug for locking admin's login and persistent XSS in the admin section. If an attacker enters certain values into the login page three times within five minutes, the admin's login will be locked. Additionally, in the edit section, which is accessible to admins, it is possible to enter a script in the description field that only executes when an admin visits the page.
This exploit allows an attacker to cause a denial of service on the host OS by running a script on the host OS. The script creates a file with the name 'VMwareKbdFilter' and uses DeviceIoControl with a specific IOCTL code to cause the host OS to crash.
This exploit allows an attacker to add an admin account to the Traidnt UP software by sending a malicious POST request to the users.php page. The POST request contains the username, password, email, birthdate, country, and group of the new admin account.
SnackAmp 3.1.3B is vulnerable to a malicious SMP buffer overflow vulnerability. This vulnerability is caused by a lack of proper bounds checking when handling SMP files. An attacker can exploit this vulnerability by crafting a malicious SMP file with a large amount of data, which can lead to arbitrary code execution. The exploit code contains a payload of 144 bytes that will execute the calc.exe program.