ig-shop suffers from two eval's that can be controlled by an attacker. The eval statements can be exploited through the following URLs:- http://127.0.0.1/ig_shop/cart.php?action=;phpinfo();//- http://127.0.0.1/ig_shop/page.php?action=;phpinfo();//There is also an SQL injection vulnerability in the compare_product.php script, which can be exploited through the following URL:- http://127.0.0.1/ig_shop/compare_product.php?id=1%20union%20select%201The vendor's page is http://www.igeneric.co.uk/
The vulnerability allows an attacker to inject SQL queries into the product_id parameter of the productdetail.asp page, leading to unauthorized access to the database.
This script demonstrates a SQL injection vulnerability in the Simple Web Content Management System. It allows an attacker to retrieve sensitive information from the database, specifically the login credentials for the admin section.
The LocazoList version v2.01a beta5 is vulnerable to a remote SQL injection attack. An attacker can exploit this vulnerability by manipulating the 'subcatID' parameter in the 'main.asp' file. By injecting malicious SQL queries, the attacker can retrieve sensitive information from the database, such as usernames and passwords.
iScript MultiCart is a paid shopping cart system that suffers from XSS and Cross-site request forgery vulnerability. An attacker can manipulate user data by sending them a malicious crafted URL. The XSS vulnerability is found in the product Review feature, allowing the execution of injected code whenever a product is visited by clients. The CSRF vulnerability allows an attacker to perform actions on behalf of a victim user without their consent.
The EmbeddedWB Web Browser ActiveX control is prone to a remote code-execution vulnerability. Exploiting this issue allows remote attackers to execute arbitrary machine code in the context of applications using the affected ActiveX control and possibly to compromise affected computers.
ManageEngine DesktopCentral 8.0.0 build 80293 and below suffer from an arbitrary file upload vulnerability that can be leveraged to gain arbitrary code execution on the server. The code run on the server in this fashion will execute as NT-AUTHORITYSYSTEM. The problem exists in the AgentLogUploadServlet. This servlet takes input from HTTP POST and constructs an output file on the server without performing any sanitisation or even checking if the caller is authenticated. Due to the way the path is constructed it is possible to traverse to the application web root and create a script file that will be executed when called from a web browser.
A buffer overflow vulnerability has been identified in Avira Secure Backup v1.0.0.1 Build 3616. The application loads the values of the Registry Keys "AutoUpdateDownloadFilename" and "AutoUpdateProgressFilename" from "HKEY_CURRENT_USERSoftwareAvira Secure Backup" on startup but does not properly validate the length of the fetched values before using them in the further application context, which leads to a buffer overflow condition with possible persistent code execution. An attacker needs to force the victim to import an arbitrary .reg file in order to exploit the vulnerability. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploits will result in a denial-of-service condition. The attack scenario is persistent, because the code is executed as long as the manipulated values are loaded.
The HOTBOX router/modem appliance manufactured by SAGEMCOM and carries the model name F@st 3184 is vulnerable to multiple vulnerabilities. These vulnerabilities include default WPS Pin, authentication based on IP Address, DoS via crafted POST, Path/Directory Traversal, Script injection via DHCP request, and no CSRF Token. These vulnerabilities can be exploited to perform various attacks such as denial of service, unauthorized access, and injection of malicious scripts.
This exploit demonstrates a buffer overflow vulnerability in Plogue Sforzando v1.665. By changing the values in the AriaSetup.xml file, an attacker can generate a buffer overflow. The payload consists of a junk value, followed by an overwrite of the next SEH and SEH values, and a shell code. The exploit is tested on Windows XP SP3.