This module exploits a vulnerability found in the ActiveX component of Adobe Flash Player before 12.0.0.43. By supplying a specially crafted swf file it is possible to trigger an integer underflow in several avm2 instructions, which can be turned into remote code execution under the context of the user, as exploited in the wild in February 2014. This module has been tested successfully with Adobe Flash Player 11.7.700.202 on Windows XP SP3, Windows 7 SP1 and Adobe Flash Player 11.3.372.94 on Windows 8 even when it includes rop chains for several Flash 11 versions, as exploited in the wild.
The vulnerability exists in the pop_profile.asp script in Snitz Forums 2000 Version 3.1 SR4. An attacker can inject malicious SQL code through the 'id' parameter, which can lead to unauthorized access to the database.
This exploit targets a vulnerability in Mail Enable Professional version 2.35 for Windows. It allows an attacker to execute remote code on the vulnerable system.
This exploit targets Solaris 2.5.1 /usr/bin/ps command. It takes advantage of a buffer overflow vulnerability in the program. The exploit code is written in C and it overflows the target buffer for optargs, modifies the environ pointer, and fills the _ctype table with a specific value. It also builds up the _iob[0] structure. The exploit is designed for Solaris 2.5.1.
Mail Enable Professional/Enterprise v2.32-4 (win32) remote exploit
The vulnerability allows an attacker to perform a SQL injection attack on the Aktueldownload Haber scripti (id) through the HaberDetay.asp page. By manipulating the 'id' parameter, an attacker can execute arbitrary SQL queries and retrieve sensitive information from the database.
Successful exploits can allow attackers to crash the affected browser, resulting in denial-of-service conditions. Given the nature of this issue, attackers may also be able to corrupt process memory and run arbitrary code, but this has not been confirmed.
The vulnerability allows an attacker to execute arbitrary SQL queries in the CodeAvalanche News software by injecting malicious code through the 'CAT_ID' parameter in the 'inc_listnews.asp' script. This can lead to unauthorized access, data theft, and potentially full control of the application and underlying database.
An attacker can execute an XSS and inject SQL commands in the search form. The vulnerability requires the attacker to be logged in the admin panel.
F5 BIG-IQ v4.1.0.2013.0 is vulnerable to a privilege escalation attack which allows an attacker to change the root users password. This module does just this, then SSH's in.