Free MP3 CD Ripper 2.6 is vulnerable to a buffer overflow vulnerability when a specially crafted .mp3 file is opened. This can be exploited to execute arbitrary code by overwriting the SEH handler with a pointer to malicious code.
A buffer overflow vulnerability exists in Faleemi Desktop Software 1.8.2 due to improper bounds checking of user-supplied input. An attacker can exploit this vulnerability by supplying a maliciously crafted input to the 'Save Path for Snapshot and Record file' field, resulting in arbitrary code execution.
A user with access to the Reports and Templates functionality can use XSL Transformations (XSLT) to perform malicious operations, including but not limited to file read, file write, and code execution.
The local buffer overflow vulnerability can be exploited by local attackers with restricted system user account without user interaction. For security demonstration or to reproduce follow the provided information and steps below to continue. Manual steps to reproduce the vulnerability include installing the software, copying a string from bof.txt to clipboard, running VideoConverter.exex, going to Menu > Edit > Options > Set Output folder (Input), pasting the input string and clicking Open, a messagebox opens, clicking ok, and the software will stable crash or shut down.
InduSoft Web Studio 8.1 SP1 is vulnerable to a local buffer overflow (SEH Unicode) when a specially crafted 'Tag Name' is pasted into the application. This can be exploited by an attacker to execute arbitrary code on the target system.
Smart network camera devices have broken access control. Attackers are able to download /updownload/t.report (aka Log & Report) files and download backup files (via download.php) without authenticating. These backup files contain user credentials and configuration information for the camera device. An attacker is able to discover the backup filename via reading the system logs or report data, or just by brute-forcing the backup filename pattern. It may be possible to authenticate to the admin account with the admin password.
On the forum RSS Syndication page you can generate a URL for example... http://localhost/syndication.php?fid=&type=atom1.0&limit=15, the thread titles on those generated links aren't sanitized. To exploit this vulnerability, a malicious user can create a thread with a malicious payload as the thread title, which when clicked will redirect the user to a malicious website.
IBM IGI version 5.2.3.2 is suffering from unauthenticated remote SQLi. The vulnerability enable remote unauthenticated attacker to take over the server database and affect the confidentiality, integrity and availability of the system. The vulnerability is in the survey end point API /survey/api/config?userId=XXX, where the userId parameter value is injected directly to a sql query without sensitization nor validation and by exploiting it the attacker will be able to gain access on the server database.
A buffer overflow vulnerability exists in Infiltrator Network Security Scanner 4.6, which could allow an attacker to cause a denial of service condition. An attacker can create a malicious file containing 6000 bytes of data and paste the contents of the file into the 'Scan Target' field. When the 'Scan' button is clicked, the application will crash.
When a maliciously crafted file is opened in PDF Explorer 1.5.66.2, a denial of service (DoS) condition can be triggered. This is due to a buffer overflow error when the contents of the file are copied into the 'Label' field of the 'Custom fields settings' window. This causes the application to crash.