This exploit allows an attacker to inject malicious SQL queries into the OpenX application. The vulnerability is due to the lack of input validation in the 'ac.php' script, which allows an attacker to inject arbitrary SQL queries into the application. This exploit was discovered and coded by d00m3r4ng.
http://olib.site.com/cgi/?session=[session_key]&infile=[LFI] files in dir - get_settings.ini, setup.ini(contains config file locations), text.ini You need to login to get a valid session key.
A vulnerability in Bux.to Clone script allows an attacker to set arbitrary cookies by using the javascript code 'javascript:document.cookie = "loggedin=1; path=/"; document.cookie = "usNick=admin; path=/";'
vxftpsrv is the most common ftp server for mobile devices: wm, ppc etc. It suffer of an overflow when it recieve too long data string by the CWD command. The result will be immediately close server and the windows mobile device will really hang-up. So it's required to reset the device to be completely operational. Maybe we can exploit this issue for doing command execution but it has not been tested.
An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. The attacker can inject arbitrary SQL code in the 'lnkid' parameter of the 'ratelink.php' script. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. This can be exploited to disclose the content of the database, modify data, execute administration operations, etc.
An attacker can exploit this vulnerability by setting a malicious cookie using the javascript command 'document.cookie = "admin=ja; path=/"'. This will allow the attacker to gain administrative access to the application.
RPortal v1.1 is vulnerable to remote and local file inclusion. The variable $file_op is not filtered, allowing an attacker to inject malicious code and execute commands.
A buffer overflow vulnerability exists in ESET System Analyzer Tool - Eset SysInspector AntiStealth driver - 3.0.65535.0 - esiasdrv.sys, which could allow an attacker to execute arbitrary code on the vulnerable system. The vulnerability is due to improper bounds checking of user-supplied input when handling IOCTL_METHOD_NEIGHTER requests. An attacker can exploit this vulnerability by sending a specially crafted IOCTL_METHOD_NEIGHTER request to the vulnerable driver. Successful exploitation could result in arbitrary code execution in the context of the kernel.
An attacker might be able to inject and execute PHP code through $_POST['start_date'], that is passed to eval() at line 85.
Crux Gallery version 1.32 is vulnerable to Local File Inclusion. The vulnerability exists due to the lack of proper sanitization of user-supplied input to the 'theme' parameter in 'index.php' script. An attacker can exploit this vulnerability to include arbitrary files from the web server and execute arbitrary code on the vulnerable system.