The AForum version 1.33 is vulnerable to remote file inclusion in the Func.php file. An attacker can exploit this vulnerability by injecting a malicious shell.txt file through the CommonAbsDir parameter in the URL. This allows the attacker to execute arbitrary code on the affected server.
This exploit allows an attacker to escalate their privileges on CentOS 7.1/Fedora22 systems. It takes advantage of insecure open() usage in abrt-hook-ccpp and insecure temp directory usage in abrt-action-install-debuginfo.
This exploit targets the BarCodeWiz ActiveX Control 2.0 (BarcodeWiz.dll) and allows for remote buffer overflow. It can be used to execute arbitrary code on a vulnerable system. The exploit has been tested on Windows XP Professional SP2 fully patched.
This exploit is a remote SEH buffer overflow that bypasses DEP using ROP (Return Oriented Programming). It is based on a non-DEP SEH buffer overflow exploit by Audit0r. The exploit allows an attacker to execute arbitrary code on the target system.
An attacker can exploit this vulnerability to bypass certain security restrictions and gain unauthorized access to sensitive areas of the application, potentially leading to further attacks.
This exploit targets the SetEvalExpiryDate method in the DSKernel2.dll file of Sienzo Digital Music Mentor (DMM) version 2.6.0.4. It allows an attacker to overwrite the EIP register, leading to arbitrary code execution.
This exploit targets the SetEvalExpiryDate method in the DSKernel2.dll file of Sienzo Digital Music Mentor (DMM) version 2.6.0.4. It triggers a stack overflow and overwrites the SEH (Structured Exception Handler) to execute arbitrary code. The exploit includes a shellcode that opens the calculator application.
This exploit opens a new command prompt window using a buffer overflow vulnerability. It is tested on Windows 2000 with Service Pack 4 and OllyDbg v1.09d. The exploit code is written in C and can be executed using OllyDbg by pressing the F9 key. The code is written by Ahmet Cihan (aka hurby) and credits are given to r3d_b4r0n, Murat Erdo??an (aka Stormwr), Onur Cihan (aka eurnie and 3710336), Orhan Tun????z, and Mehmet Yakut.
The application BilboPlanet is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
This module exploits a SQL injection vulnerability found in Joomla versions 3.2 up to 3.4.4. The vulnerability exists in the Content History administrator component in the core of Joomla. Triggering the SQL injection makes it possible to retrieve active Super User sessions. The cookie can be used to login to the Joomla administrator backend. By creating a new template file containing our payload, remote code execution is made possible.