The vulnerability is caused due to improper validation to Read Request Parameter containing '../' sequences, which allows attackers to read arbitrary files via directory traversal attacks.
Exploit for ServiceDesk v *.* OS: Windows which allows an attacker to download backup files from the server.
This module exploits a vulnerability found in MicroP 0.1.1.1600. A stack-based buffer overflow occurs when the content of a .mppl file gets copied onto the stack, which overwrites the lpFileName parameter of a CreateFileA() function, and results arbitrary code execution under the context of the user.
LuxCal Web Calendar versions 2.4.2 and 2.5.0 are vulnerable to SQL injection. An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable application. This can be done by sending a specially crafted HTTP request to the vulnerable application. This can allow an attacker to gain access to sensitive information stored in the database.
This module exploits a stack-based buffer overflow in Coolplayer 2.19.2. An attacker must send the file to the victim and the victim must open the file.
This module exploits a buffer overflow found in the USER command of the Freefloat FTP server.
The vulnerability is caused due to a boundary error in the processing of a playlist file, which can be exploited to cause a stack-based buffer overflow when a user opens a specially crafted .asx file. Successful exploitation may allow execution of arbitrary code.
BbZL.PhP is vulnerable to remote file inclusion. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable parameter 'lien_2' in the index.php file. This can allow the attacker to execute arbitrary code on the server.
A SQL injection vulnerability exists in DmxReady Secure Document Library v1.2. An attacker can send a malicious SQL query to the vulnerable parameter 'ItemID' in 'update.asp' page, which can be used to extract sensitive information from the database.
This module exploits a stack-based buffer overflow in WordTrainer v3.0. An attacker must send the file to the victim and the victim must open the file.