Joomla Component com_hbssearch(r_type) is vulnerable to Blind SQL-injection. An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable parameter. This can be used to extract sensitive information from the database.
This script only checks if the file you are uploading is not a text/plain file so you can upload whatever you want, for example a PHP Shell.
CoolPlayer 2.19 is vulnerable to a local buffer overflow vulnerability. This vulnerability is caused by a lack of proper bounds checking when handling skin files. An attacker can exploit this vulnerability by crafting a malicious skin file and convincing a user to open it. This will allow the attacker to execute arbitrary code on the vulnerable system.
Sending a large HTTP GET/POST request (10240) to the router results in DoS of the httpd service.
A vulnerability in Emefa Guestbook V 3.0 allows an attacker to remotely access the database of the application. This can be done by accessing the guestbook.mdb file located in the root directory of the application. This vulnerability can be exploited by an attacker to gain access to sensitive information stored in the database.
This exploit is related to the PowerStrip NT kernel-mode driver - pstrip.sys <= 5.0.1.1. It allows a local user to gain elevated privileges on the system. The exploit is based on the common flaws in drivers and was discovered by Ruben Santamarta.
ChiCoMaS is free web based Content Management System based on PHP & MySQL with Full featured WYSIWYG TinyMCE editor, File management with QuiXplorer, User and group administration to manage access permissions & Backup/Restore with integrated MySqlBackupPro. Database Information Disclosure can be exploited by accessing http://[URL]/chicomas/config.inc. The Latest generated Database backups can be accessed by http://[URL]/chicomas/backup. Cross Site Scripting (XSS) can be exploited by Reflected XSS attack in 'index.php' in 'q' parameter by accessing http://[URL]/chicomas/index.php?q='<script>alert(/www.BugReport.ir/.source)</script>'
A vulnerability exists in ReVou Twitter Clone which allows an attacker to upload arbitrary files on the server. An attacker can create a file called name.php and fill it with malicious code and upload it to the server. This can be done by going to the “My photo” page and selecting the shell and uploading it.
This exploit is used to gain access to the password of a user in the Userlocator 3.0 application. It uses a SQL injection vulnerability to gain access to the password of a user by using the user id. It uses the LWP::Simple module to send requests to the application and then uses the ASCII code of the characters to get the password of the user.
Constructr CMS versions <= 3.02.5 have a vulnerability that allows attackers to traverse directories, disclose source code, and create arbitrary files. This is possible due to the magic_quotes_gpc and register_globals settings being set to Off and On respectively. Additionally, attackers can gain access to the database information by accessing the config/config.inc.php file. Furthermore, attackers can gain access to user information by using a SQL injection attack on the show_page parameter. The user's password is stored in plaintext in the hash field.