The exploit overwrites the system.ini file, which can cause the PC to not restart. All software that uses this ocx are vulnerable to this exploit.
This exploit targets a vulnerability in the V8 JavaScript engine, specifically an out-of-bounds write bug. By manipulating certain arrays and memory layouts, the exploit is able to write to memory locations outside of the intended bounds, potentially leading to arbitrary code execution. The exploit takes advantage of a bug reported in the Chromium bug tracker (https://crbug.com/716044).
The MsMpEng component in Windows Defender includes a full system x86 emulator that is used to execute untrusted files. The emulator runs with high privileges and is not sandboxed. The vulnerability allows an attacker to control the emulator through the NtControlChannel API, which can be abused to execute arbitrary code. The provided exploit code demonstrates how to trigger the vulnerability by creating a malicious import library and calling it from emulated code.
Aries QWR-1104 Wireless-N Router is a home based router that provides extra features like WDS and Bridging. The router's Site Survey page, used for monitoring networks, is vulnerable to executing malicious JavaScript code.
There is a heap overflow in SkARGB32_Shader_Blitter::blitH caused by a rounding error in SkEdge::setLine. To trigger the bug Skia needs to be compiled with SK_RASTERIZE_EVEN_ROUNDING (true in, for example, Mozilla Firefox).
The exploit takes advantage of a vulnerability in IBM Lotus Domino versions 7.0.2 and 6.5.5 FP2. It allows an attacker to execute arbitrary code on the server by manipulating the ECX register and using a buffer overflow.
The exploit code creates iframes within iframes in order to trigger a heap-use-after-free vulnerability in WebKit. This vulnerability allows an attacker to read from or write to previously freed memory, potentially leading to arbitrary code execution.
The vulnerability allows an attacker to pull out admin/members login credentials by exploiting a SQL injection vulnerability in the BlogSite Professional application. The exploit uses a crafted URL to perform a UNION SELECT statement and retrieve the username and password from the websiteadmin_admin_users table.
netagent_handle_register_setopt function in netagent_ctl_setopt.c in the XNU kernel in Apple iOS before 9.3.5 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
Demonstrates a generic kde authentication bypass vulnerability using smb4k PoC. The exploit involves sending a variant map containing an evil mh_command key-pair to the net.sourceforge.smb4k.mounthelper D-Bus service.