This exploit bypasses Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) using the ASM.JS JIT Spray technique. It targets Firefox version 50.0.1 and exploits a vulnerability (CVE-2016-9079) in the Tor Browser.
This exploit allows an attacker to escalate their privileges to root on IBM AIX versions up to 5.3 sp6. It takes advantage of a vulnerability in the AIX pioout command.
This vulnerability allows a low privilege user to escalate to an administrative user via a bug within the Viewfinity "add printer" option.
The software transmits sensitive data using double Base64 encoding for the Cookie 'auth_token' in a communication channel that can be sniffed by unauthorized actors or arbitrarily be read from the vxcore log file directly using directory traversal attack resulting in authentication bypass / session hijacking.
The Pelco VideoXpert Core Admin Portal is vulnerable to directory traversal, allowing an unauthenticated attacker to view arbitrary files within the context of the web server.
The affected cameras suffer from authenticated remote code execution vulnerability. The POST parameter 'enable_leds' located in the update() function called via the GeneralSetupController.php script is not properly sanitised before being used in writeLedConfig() function to enable led state to on or off. A remote attacker can exploit this issue and execute arbitrary system commands granting her system access with root privileges using a specially crafted request and escape sequence to system shell.
This exploit targets the deleteReport() function in the Nessus Vulnerability Scanner 3.0.6 ActiveX control. By passing a relative path to the deleteReport() function, an attacker can delete arbitrary files on the system. The exploit was discovered by Krystian Kloskowski (h07) and has been tested on Nessus 3.0.6 running on Internet Explorer 6 on Windows XP SP2 (Polish). This exploit is provided for demonstration purposes only.
Easy File Sharing Webserver v1.25 will consume 99% of CPU usage until it crashes when sent large requests.
The exploit creates a crafted .mls file which triggers a buffer overflow in Crystal Player 1.98. This vulnerability allows an attacker to overwrite the EIP and EBP registers, leading to a Denial of Service (DOS) and potential library destruction upon successful exploitation. The exploit adds a user 'root' with password 'root' to the operating system. It has been tested on x86 Vista Enterprise Edition.
The Android application is vulnerable to Remote Code Execution attacks. This is caused by specific lines of code within the main.java file.