The default installation directory for Icecream Ebook Reader, Icecream Screen Recorder, and Icecream Slideshow Maker have weak folder permissions that grant EVERYONE change/modify privileges. This allows an attacker to execute their own code under any other user running the application.
WinSMS installs with weak folder permissions, allowing any user to execute code against other users running the application. Additionally, sensitive information such as the proxy server password is stored in plain text.
This exploit allows an attacker to execute arbitrary code in the context of the user running Internet Explorer. The vulnerability occurs due to a use-after-free condition in the MSHTML component of Internet Explorer. By manipulating memory objects, an attacker can corrupt the program's memory and execute malicious code. This exploit has been tested on Windows 7 (x64) with Internet Explorer version 11.0.9600.18482.
This exploit allows an attacker to retrieve the admin username and hash from the ComicSense 0.2 application. The vulnerability exists in the index.php file where the 'epi' parameter is not properly sanitized. By injecting a UNION SELECT statement, an attacker can retrieve the desired information.
The vulnerability exist in the web interface, which is accessible without authentication. Once modified, systems use foreign DNS servers, which are usually set up by cybercriminals. Users with vulnerable systems or devices who try to access certain sites are instead redirected to possibly malicious sites. Modifying systems' DNS settings allows cybercriminals to perform malicious activities like steering unknowing users to bad sites, replacing ads on legitimate sites, controlling and redirecting network traffic, and pushing additional malware.
This exploit allows an attacker to inject SQL code into the 'id' parameter of the 'edit.php' file in wdcalendar version 2. By appending a union select statement to the parameter, an attacker can retrieve sensitive information from the database.
Battle.Net installs with weak folder permissions granting any built-in user account with full permission to the contents of the directory and its subfolders. This allows an attacker an opportunity for their own code execution under any other user running the application.
This is a remote code execution exploit for PBLang version 4.67.16.a. It allows an attacker to execute arbitrary commands on the target server.
This exploit may crash the Lamahub service in many cases. If you compile with -fno-stack-protection and -z execstack you will be able to execute arbitrary code.
1) Local path disclosure - changing a variable to an array can reveal the local path where the application is installed. 2) Open redirect - the 'Referer' header can be manipulated to redirect to any URL. 3) Reflected XSS in username and search fields. 4) Persistent XSS on admin backend homepage and in category name. 5) Unrestricted file upload allows uploading any file type. 6) Code execution race condition during file upload. 7) SQL injection in the 'days_behind' parameter of the getJobs API.