All versions of LabStore <= 1.5.4 are affected by Sql injection vulnerabilities. A valid account could be required to exploit the vulnerabilities.
WHMCS ( WHMCompleteSolution ) 3.x / 4.x Multiple Vulnerability is a vulnerability that allows an attacker to gain access to sensitive files on the server. In the first exploit, an attacker can use the submitticket.php file to gain access to the boot.ini file by using the step parameter with an unknown value and the templatefile parameter with the path to the boot.ini file. In the second exploit, an attacker can use the downloads.php file to gain access to the boot.ini file by using the action parameter with an unknown value and the templatefile parameter with the path to the boot.ini file. In the third exploit, an attacker can use the reports.php file to gain access to the boot.ini file by using the report parameter with the path to the boot.ini file.
This module exploits a vulnerability found in Excel of Microsoft Office 2007. By supplying a malformed .xlb file, an attacker can control the content (source) of a memcpy routine, and the number of bytes to copy, therefore causing a stack-based buffer overflow. This results aribrary code execution under the context of user the user.
This exploit uses a race condition toggler to mount from non-block devices. It creates an overlay container, mounts the staging using the race condition toggler, prepares the overlay with /etc/pam.d modification, and unmounts the staging. Finally, it cleans up the overlay container.
aidiCMS v3.55 is affected by the vulnerability that allows an attacker to execute arbitrary code on the vulnerable system. This is achieved by sending a specially crafted POST request to the ajax_create_folder.php script, which contains a malicious payload that is written to a file called foo.php. The attacker can then execute arbitrary code by sending a specially crafted GET request to the foo.php script, which contains a base64 encoded command in the Cmd header.
All versions of phpMyFAQ <= 2.6.18 and phpMyFAQ <= 2.7.0 are affected by the vulnerability that can be exploited by an authenticated user. Successful exploitation of this vulnerability requires authentication.
All versions of Zenphoto from 1.2.4 to 1.4.1.4 are affected by the vulnerability that allows an attacker to execute arbitrary code on the vulnerable system.
This module exploits a stack buffer overflow in Mini-Stream 3.0.1.1 By creating a specially crafted pls file, an an attacker may be able to execute arbitrary code.
An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable server with a wrong value in the action parameter and a malicious file path in the templatefile parameter. This will allow the attacker to view the contents of the file specified in the templatefile parameter.
This exploit is used to leak information from the Linux kernel version 2.6.37-rc1 serial_multiport_struct. It uses the TIOCGICOUNT ioctl to read the reserved field of the serial_multiport_struct structure and write it to a file. The exploit takes two arguments, the name of the file to write the leaked information to and the size of the reserved field.