This exploit takes advantage of a local buffer overflow vulnerability in RGui 3.5.0. By providing a specially crafted input, an attacker can overwrite the Structured Exception Handler (SEH) and bypass Data Execution Prevention (DEP). This allows the attacker to execute arbitrary code on the target system. The vulnerability was fixed in version 3.5.1 of RGui.
A vulnerability in Microsoft SharePoint Server could allow a remote attacker to make the server unavailable. The vulnerability is a result of the dependency SharePoint has in Microsoft.Data.OData library which was vulnerable to remote DOS (See CVE-2018-8269). The exploit is done by sending a crafted request that contains an OData filter that triggers the vulnerability in Microsoft.Data.OData library. Sending such request, will terminate the process that runs the server. By default, SharePoint server is configured to recover a terminated process, but it will do so only 10 times. If more than 10 malicious requests are sent in 5 minutes interval, the server will not recover and will be down until it is manually restarted.
The exploit allows an attacker to change the admin username and password by using a CSRF attack. The attacker can submit a form with the desired username and password values, which will be saved on the target device.
The AxMetaStream activex contains various methods which accept parameters as String. All these methods are vulnerable to a stack based buffer overflow when you pass an overly long (greater than 6999 characters).
KioWare Server version 4.9.6 and older installs by default to "C:kioware_com" with weak folder permissions granting any user full permission "Everyone: (F)" to the contents of the directory and it's sub-folders. In addition, the program installs a service called "KWSService" which runs as "Localsystem", this will allow any user to escalate privileges to "NT AUTHORITYSYSTEM" by substituting the service's binary with a malicious one.
The phpMoAdmin version 1.1.5 is vulnerable to Cross-Site Request Forgery (CSRF) and Cross-Site Scripting (XSS) attacks. The CSRF vulnerabilities allow an attacker to perform actions on behalf of the victim, such as creating a new database, dropping a database, repairing a database, and adding a new collection. The XSS vulnerabilities allow an attacker to inject malicious scripts into the application, potentially leading to session hijacking, defacement, or data theft.
This script is a remote code execution exploit for JBC Explorer version 7.20 RC 1. It allows an attacker to execute arbitrary PHP code on the target system.
A stored xss found in 'Embed Video Scripts' comments section.
This module exploits the command injection vulnerability of MailCleaner Community Edition product. An authenticated user can execute an operating system command under the context of the web server user which is root./admin/managetracing/search/search endpoint takes several user inputs and then pass them to the internal service which is responsible for executing operating system command. One of the user input is being passed to the service without proper validation. That cause a command injection vulnerability.