ccTiddly 1.7.4 (cct_base) is vulnerable to multiple Remote File Inclusion vulnerabilities. Attackers can exploit these vulnerabilities by sending malicious requests to the vulnerable web application. The vulnerable files are index.php, proxy.php, header.php, include.php and workspace.php. The vulnerable code snippets are include_once($cct_base."includes/header.php");, include_once($cct_base."includes/config.php");, include_once($cct_base."includes/functions.php");, include_once($cct_base."lang/".$tiddlyCfg['pref']['language']."/language.php");, include_once($cct_base."includes/tiddler.php");, include_once($cct_base."includes/user.php");, include_once($cct_base."includes/ccAssignments.php"); and include_oce($cct_base."includes/config.php");.
Multi SEO phpBB version 1.1.0 is vulnerable to a remote file inclusion vulnerability. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable application. The malicious URL contains a malicious file which is then included and executed on the vulnerable server. This can lead to the execution of arbitrary code on the vulnerable server.
RadAsm <=2.2.1.5 is vulnerable to a pointer hijack exploit. A long buffer passed to the program by Group key in the project file '.rap files' can lead to overwrite the pointer of WindowCallProcA that was stored in memory. This can be exploited to execute arbitrary code by overwriting the pointer with the address of the shellcode.
Admin login page of Web Based Contact Management is vulnerable to SQL Injection. All versions (SOHO Version, Standard Version, Enterprise Version) are vulnerable. An attacker can bypass authentication by using the username 'anything' and the password 'delta' or 'a'='a'.
This exploit allows an attacker to inject malicious SQL queries into the vulnerable Joomla component com_jmovies 1.1. The attacker can use this vulnerability to gain access to the database and extract sensitive information such as usernames and passwords.
There is a recursive stack overflow in clamav 0.93.3 and 0.94 (and probably older versions) in the jpeg parsing code. It scan's the jpeg file, and if there is a thumbnail, it'll scan that too. The thumbnail itself is just another jpeg file and the same jpeg scanning function gets called without checking any kind of recurising limit. This can easely lead to a recurisive stack overflow. The exploit shown below triggers this recursive stack overflow by creating a fake jpg file. Once created and passed on to clamav it'll go in a recursive stack loop untill clamav runs out of stack memory and causes a stack overflow. Effectively crashing clamav.
This exploit allows an attacker to gain access to the admin panel of Check Up New Generation 4.52 by exploiting a SQL Injection vulnerability in the findoffice.php search page. The exploit requires the magic_quotes_gpc to be set to off.
A Blind SQL Injection vulnerability exists in Calendar Mx Professional, which is a web-based calendar application developed by www.mxmania.net. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to sensitive information stored in the database.
The vulnerability exists due to the improper sanitization of user-supplied input in the 'db/cldb.mdb' script. A remote attacker can send a specially crafted HTTP request to the vulnerable script and execute arbitrary SQL commands in application's database. This can be exploited to bypass authentication, access, modify or delete data, etc.
An attacker can inject malicious SQL queries into the 'id' parameter of the 'popupproduct.php' script. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. An example of a malicious URL is http://localhost/sunbyte/popupproduct.php?id=[uR eViLNeSS HeRe]