This is an exploit for Bifrost 1.2d that allows remote code execution. The exploit utilizes the RC4 encryption algorithm to encrypt the payload and then sends it to the vulnerable host. The payload contains a shellcode that executes the 'calc.exe' process.
The Bifrost 1.2.1 exploit is a buffer overflow vulnerability that allows an attacker to execute arbitrary code on a remote system. The vulnerability exists in the 'header' function, which is called when generating the header for a Bifrost connection. By sending a specially crafted request, an attacker can overwrite the return address of the function and gain control of the execution flow. This exploit uses a combination of techniques, including RC4 encryption and shellcode injection, to bypass security measures and achieve remote code execution.
Attackers can modify a text file to include local variables containing shell commands in an 'eval' statement, leading to the execution of arbitrary commands.
An attacker can inject arbitrary script code in the browser of an unsuspecting user by exploiting a failure in input sanitization in Antville. This can lead to the theft of authentication credentials and other attacks.
File Transfer is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input data. Exploiting this issue allows an attacker to access arbitrary files outside of the application's root directory. This can expose sensitive information that could help the attacker launch further attacks.
This exploit allows an attacker to execute remote code on a phpBP RC3 (2.204) server. The vulnerability is caused by a SQL injection and command injection vulnerability in the phpBP script. To successfully exploit this vulnerability, the attacker needs to have an admin session.
This exploit takes advantage of a buffer overflow vulnerability in Publish-It 3.6d. By opening a specially crafted .pui file with the 'Automatic Preview' option enabled, an attacker can trigger a stack-based buffer overflow, potentially allowing for remote code execution. The exploit is in the form of a .pui file named 'motiv.pui'.
Two SQL injection vulnerabilities in AuraCMS allow remote authenticated attackers to execute arbitrary SQL commands in the application's database. The first vulnerability (CVE-2014-1401) is due to insufficient validation of the 'search' parameter in the '/index.php' script. The second vulnerability is due to insufficient validation of certain HTTP headers in the '/index.php' script.
The ComVironment 4.0 application is vulnerable to remote code execution. This vulnerability exists in the 'grab_globals.lib.php' file, specifically on line 3. The vulnerable code can be exploited by providing a malicious code in the 'inc_dir' parameter. An attacker can craft a specially crafted URL to execute arbitrary code on the target system.
This module exploits a vulnerability found in Pandora FMS 5.0RC1 and lower. It will leverage an unauthenticated command injection in the Anyterm service on port 8023. Commands are executed as the user 'pandora'. In Pandora FMS 4.1 and 5.0RC1 the user 'artica' is not assigned a password by default, which makes it possible to su to this user from the 'pandora' user. The 'artica' user has access to sudo without a password, which makes it possible to escalate privileges to root. However, Pandora FMS 4.0 and lower force a password for the 'artica' user during installation.