The mod_visitorsgooglemap module of Visitors Google Map Lite 1.0.1 (FREE) is vulnerable to remote SQL injection. The vulnerability exists in the map_data.php file.
This exploit targets a vulnerability in Mozilla Firefox version 3.6.3. It allows an attacker to execute arbitrary code remotely.
This exploit takes advantage of a stack-based overflow vulnerability in Microsoft Office Visio 2002 (xp) when parsing DXF files. By specially crafting a DXF file, an attacker can overwrite the EIP register and control the execution flow of the program. This exploit includes a modified alphanumeric shellcode that executes the calc.exe program.
This exploit targets the ColdCalender v2.06 application, specifically the index.cfm file which is vulnerable to SQL Injection. The exploit assumes that the target has a MSSQL backend. It allows an attacker to execute arbitrary SQL queries and retrieve sensitive information from the database. The exploit also identifies the version of the database, the hostname, the database user, and the database name.
The PHP/Java Bridge 5.5 suffers from a directory traversal vulnerability. This vulnerability could allow attackers to read arbitrary files.
EGS Enterprise Groupware System <=1.0 rc4 is vulnerable to remote commands execution. This exploit works against PHP5. The attacker needs to launch the exploit from Apache, fill in the requested fields, and then execute the commands remotely.
Weborf httpd <= 0.12.2 suffers a directory traversal vulnerability. This vulnerability could allow attackers to read arbitrary files.
This exploit allows remote attackers to execute arbitrary commands on the vulnerable system running DocMGR version 0.54.2. It works against PHP5 with short_open_tag and register_globals set to On.
This exploit allows remote file inclusion in iJoomla Magazine version 3.0.1. By manipulating the 'config' parameter in the 'magazine.functions.php' file, an attacker can include a malicious file (SHeLL) from a remote server.
This is an exploit for CVE-2010-0265 that allows remote code execution in Movie Maker 2.1 on Windows XP SP3. The exploit involves manipulating a file and injecting shellcode to execute arbitrary commands.