A buffer overflow vulnerability exists in NCTsoft AudFile.dll ActiveX Control (AudFile.dll 1.0.0.1) that could allow a remote attacker to execute arbitrary code on the vulnerable system. The vulnerability is caused due to a boundary error within the processing of the 'OpenFile()' method. By sending a specially crafted HTTP request, an attacker can cause a stack-based buffer overflow and execute arbitrary code on the system with the privileges of the user running the application.
F-PROT Antivirus is prone to a denial-of-service vulnerability because the application fails to properly handle certain files. An attacker can exploit this issue to cause the application to enter an infinite loop, denying service to legitimate users.
Pligg is a popular open source, full featured, content management system written in php. There are a number of vulnerabilities within Pligg that allow for remote file enumeration, file inclusion, cross site scripting, and sql injection. When combined these issues allow for remote code execution on the affected installation via arbitrary php code placed within template files once admin credentials are gained via SQL Injection. Cross Site Scripting issues in Pligg that allow for the theft of client side credentials such as cookies. A number of file access issues exist in Pligg. They range from the not so severe (such as arbitrary file enumeration) to the much more severe (arbitrary file inclusion). In regards to the arbitrary file enumeration a good example of it can be found in trackback.php @ line 76.
This exploit allows an attacker to inject malicious code into the template_main.tpl file of Pligg CMS version 9.9 and below. The code is then executed when the index.php page is accessed. The attacker can then execute arbitrary commands on the server.
This exploit allows an attacker to inject malicious SQL queries into the vulnerable eNdonesia 8.4 Calendar Module. The exploit is triggered when the vulnerable parameter 'loc_id' is passed to the 'mod.php' script with a malicious SQL query. This can allow an attacker to gain access to the database and extract sensitive information such as usernames and passwords.
A remote SQL injection vulnerability exists in TubeGuru ugroups php UID. An attacker can exploit this vulnerability to inject malicious SQL queries in the application, allowing them to gain access to sensitive information stored in the database. The vulnerable parameter is UID which can be exploited by sending a malicious payload to the application. The payload is -1 UNION SELECT 1,concat_ws(0x3a,username,pwd),3,4,5,6,7,8,9,10,11,12,13,14,15+from+signup-- which can be used to extract sensitive information from the database.
A remote SQL injection vulnerability exists in the Classified Ads (cid) script. An attacker can exploit this vulnerability to gain access to sensitive information such as admin credentials. The vulnerability is due to insufficient sanitization of user-supplied input to the 'cid' parameter in the 'browsecats.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. This can allow the attacker to gain access to sensitive information such as admin credentials.
HIOX Browser Statistics 2.0 is vulnerable to an arbitrary add admin user vulnerability. An attacker can exploit this vulnerability to add an admin user to the application. This vulnerability is due to the application not properly validating user-supplied input. An attacker can exploit this vulnerability by sending a crafted HTTP request to the application.
HIOX Random Ad 1.3 is vulnerable to an arbitrary add admin user vulnerability. An attacker can exploit this vulnerability to add an admin user to the application. This vulnerability is due to the application not properly validating user-supplied input. An attacker can exploit this vulnerability by sending a crafted HTTP request to the application.
A vulnerability exists in nzFotolog v0.4.1 which allows an attacker to include a file from the local system. This can be exploited to execute arbitrary PHP code by including files from the local system which contain malicious code. The vulnerability is due to insufficient sanitization of user-supplied input to the 'action_file' parameter in 'index.php'. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal sequences and a URL-encoded NULL byte (%00) to the vulnerable script. This can be used to include arbitrary files from the local system which may contain malicious PHP code.