If we navigate the Speech directory on Windows 10 we will get some (dll) files but the interest file is (Xtel.dll). And in the normal case if we say something. that mean as there a variable which register what we say. And if we play around "Xtel.dll" we will find a function named "Speak" which take to parameter "lineID as Long" and "text as String" When we inject "A*3092" that lead to Buffer Overflow Vulnerability. The crash occur in "6344164F MOV ECX,[EAX+2C]"
Many Davolink Davolink DV 3200 devices credentials can be disclosed using the following script.
Splinterware System Scheduler Pro 5.12 suffers from Privilege Escalation due to insecure file permissions. By default, the Everyone group has the modify permission to System Schedule files, allowing a low privilege account to rename the WService.exe file and replace it with a malicious file that gives system level privileges. The service running as Local System periodically triggers the execution of the malicious file.
This exploit causes a local buffer overflow in Splinterware System Scheduler Pro 5.12, leading to a crash of the application.
The NUUO NVR software allows unauthenticated remote attackers to execute arbitrary code via a crafted HTTP request to the upgrade_handle.php script. By manipulating the 'uploaddir' parameter, an attacker can execute arbitrary commands on the target system.
The com_mp3_allopass Joomla component is vulnerable to remote file inclusion. This vulnerability allows an attacker to include arbitrary remote files, which could lead to remote code execution.
The FPOLE.OCX file in Microsoft Visual FoxPro 6.0 allows remote attackers to execute arbitrary commands via the FoxDoCmd method, as demonstrated by running cmd.exe to execute notepad.exe.
The vulnerability allows unauthenticated attackers to execute arbitrary code on the target system. The issue is caused by improper handling of user input, which allows an attacker to inject malicious code and execute it in the context of the application.
This exploit allows an attacker to execute arbitrary code on the target system running LightBlog version 8.4.1.1. The attacker can provide a command to be executed through the command line arguments.
The exploit leverages an out-of-bounds read and write vulnerability in JavaScript to manipulate memory and gain unauthorized access to objects.