This module exploits a stack buffer overflow in CyberLink LabelPrint 2.5 and below. The vulnerability is triggered when opening a .lpp project file containing overly long string characters via open file menu. This results in overwriting a structured exception handler record and take over the application. This module has been tested on Windows 7 (64 bit), Windows 8.1 (64 bit), and Windows 10 (64 bit).
The vulnerability allows an attacker to create an array with a Proxy object in the prototype chain by exploiting the 'setPrototypeDirect' method in JavaScriptCore. By setting the prototype of an array to a Proxy object, the method 'switchToSlowPutArrayStorage' or 'haveABadTime' is called, which transitions the array to a SlowPutArrayStorage array.
The vulnerability allows an attacker to download and execute arbitrary files on a targeted system using the 'HttpDownloadFile()' method in EDraw Flowchart ActiveX Control (EDImage.ocx v. 2.0.2005.1104). By convincing a user to open a specially crafted web page, an attacker can execute arbitrary code on the system with the privileges of the user.
The DM Guestbook version 0.4.1 is vulnerable to multiple local file inclusion vulnerabilities. An attacker can exploit these vulnerabilities by including arbitrary files from the system, such as /etc/passwd, by manipulating the 'lng' parameter in various PHP scripts. This allows an attacker to view sensitive information and potentially gain unauthorized access to the system.
This exploit creates a malicious payload using a buffer overflow vulnerability in LanSpy 2.0.1.159. It generates a payload with a specific length and overflows the buffer, causing a crash or potentially allowing for remote code execution.
When registering a new user in Scribe <= 0.2, a file with the username is created in the /regged/ directory. The file contains the username. An attacker can exploit this by injecting PHP code in the username field during registration, which will be executed on the target server when accessing the generated file.
The exploit script creates a file with a large payload, causing the Textpad application to crash when the payload is pasted into a specific field in the program. This leads to a denial of service.
This module exploits a SUID installation of the Emacs movemail utility to run a command as root by writing to 4.3BSD's /usr/lib/crontab.local. The vulnerability is documented in Cliff Stoll's book The Cuckoo's Egg.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett Packard Enterprise Intelligent Management Center. Authentication is not required to exploit this vulnerability. The specific flaw exists within the WebDMDebugServlet, which listens on TCP ports 8080 and 8443 by default. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute arbitrary code in the context of SYSTEM.
A Stored Cross-site scripting (XSS) was discovered in wordpress plugins easy testimonials 3.2. Three parameters(_ikcf_client _ikcf_position _ikcf_other) have Cross-Site Scripting.