A vulnerability exists in loginscript.php that allows for SQL injection of the 'user_name' and 'password' POST parameters.
The application allows authorized users to perform certain actions via HTTP requests without making proper validity checks to verify the source of the requests. This can be exploited to add, delete or modify sensitive information, for example to change administrator's email. An attacker should make logged-in administrator open a malicious link in the browser to exploit this vulnerability.
Multiple vulnerabilities in Banana Dance allow for gaining access to sensitive information, performing SQL injection attacks, and compromising the vulnerable system. The PHP File Inclusion vulnerability (CVE-2012-5242) allows for arbitrary file inclusion via improper verification of input passed via the 'name' POST parameter in '/functions/ajax.php'. The Improper Access Control vulnerability (CVE-2012-5243) allows unauthenticated users to access the '/functions/suggest.php' script and read arbitrary information from the database.
This vulnerability allows an attacker to upload a shell ASP file to the SelectSurvey CMS (ASP.NET) application, which can lead to remote code execution.
The YeaLink IP Phone SIP-TxxP firmware version 9.70.0.100 and lower is vulnerable to multiple vulnerabilities. The first vulnerability allows an unprivileged user to enable Telnet on the phone by posting directly to the ConfigManApp.com page. The default user 'user' with password 'user' can exploit this vulnerability. Additionally, a CSRF attack can also enable Telnet on the phone. The second vulnerability is the presence of default telnet shell users with hardcoded usernames and passwords in the firmware. After enabling telnet, shell access can go unnoticed.
This module exploits a flaw in the SurgeFTP server's web-based administrative console to execute arbitary commands.
The exploit causes IDA Pro 6.3 to crash due to an internal error. The root cause of the problem is the lack of validation to verify if e_shstrndx > e_shnum before referencing it.
The tipsoftheday.php file is vulnerable to stored XSS and SQL injection vulnerabilities. The stored XSS vulnerability can be exploited by injecting malicious code into the 'newtip' parameter of the '/dir/misc.php?tips=newtip' URL. The SQL injection vulnerability can be exploited by injecting SQL code into the 'tip' parameter of the '/bladir/admin/index.php?module=config-tipsoftheday&action=edittip' URL.
The Android OS is vulnerable to a local DoS when a filename with a length of 2048 or larger is attempted to be written to the sdcard(vfat fs) multiple times. The result of successful running of the exploit code is the system restarting. The vulnerability only effects Android kernels that are in the version 2.6 family.
This exploit takes advantage of a buffer overflow vulnerability in the USER command of FreeFloat FTP Server. By sending a specially crafted payload, an attacker can execute arbitrary commands on the target system. The exploit uses a combination of junk data, a return address, and a payload to achieve code execution.