This exploit targets Internet Explorer 11 and specifically the CMarkup::DestroySplayTree function. It causes a use-after-free vulnerability, leading to an access violation exception. This vulnerability allows an attacker to execute arbitrary code or crash the application.
This module exploits a type confusion vulnerability in Ghostscript that can be exploited to obtain arbitrary command execution. This vulnerability affects Ghostscript version 9.21 and earlier and can be exploited through libraries such as ImageMagick and Pillow.
This is a proof of concept exploit code for CVE-2017-3599, a vulnerability in MySQL that allows for a remote denial of service attack. The exploit code creates a packet with specific values that trigger the vulnerability and crash the MySQL server. The vulnerability occurs when the server receives a login request packet with a length value that exceeds the maximum allowed value, resulting in an integer overflow. By sending a specially crafted packet, an attacker can cause the server to crash, denying access to legitimate users.
Vulnerabilities were identified in the Alerton Webtalk Software supplied by Alerton. These vulnerabilities allow unauthenticated users to access password hashes and authenticated users to execute commands as the root user on the underlying server. The password hashes are accessible via a file in the document root of the 'webtalk' user. The command injection vulnerability allows an attacker with the 'configure webtalk' permission to execute commands as the root user.
The bemarket postscript.php file is vulnerable to remote file inclusion. An attacker can exploit this vulnerability to include arbitrary files from remote servers, leading to remote code execution.
The vulnerability allows an attacker to disclose the contents of arbitrary files via directory traversal attacks. The issue exists in the 'swagger-ui' object in SwaggerService.cs file. Input passed to this object is not properly verified before being used to load resources. The vulnerability affects multiple versions of Emby MediaServer, with different affected platforms for each version.
There is a memory corruption vulnerability in Internet Explorer. The crash happens in CStyleSheetArray::BuildListOfMatchedRules while attempting to read memory outside of the bounds of the object pointed by eax. If that read is successful and attacker-controlled address is read into edi, this down the line leads to a write at the attacker controlled address in CStyleSheetArray::BuildListOfProbableRules. Thus it might be possible to turn the issue into code execution.
This exploit demonstrates a SQL injection vulnerability in the TYPO3 News Module. The vulnerability allows an attacker to manipulate SQL queries and potentially gain unauthorized access to the database.
The vulnerability allows an attacker to execute arbitrary SQL queries in the 'insertorder.cfm' page. By manipulating the 'CFID' and 'CFTOKEN' parameters, an attacker can retrieve sensitive information such as the admin password.
The ErraticGopher exploit is a python version of the ErraticGopher exploit with some modifications. It exploits a memory corruption vulnerability (Heap Overflow) in the Windows DCE-RPC Call MIBEntryGet. By redirecting the execution to the iprtrmgr.dll library, it overwrites a return address and the SEH handler stored in the stack, allowing the control of execution flow to disable DEP and jump to the shellcode as SYSTEM user.