This exploit is related to the Trend Micro OfficeScan ObjRemoveCtrl ActiveX Control Buffer Overflow vulnerability. It was written by e.b. and tested on Windows XP SP2(fully patched) English, IE6 + IE7, OfficeScan 7.3 patch 4, OfficeScanRemoveCtrl.dll version 7.3.0.1020. The control is installed when you install OfficeScan through the server web console. This was fixed in OfficeScan 8.x(uses strcpy_s which throws INVALID_PARAMETER, still crashes the browser though).
Velocity web-server has critical directory traversal vulnerability. Attacker can exploit this by sending a url with url directory traversal. Example: http://[server]:[port]/../../../../../../../../../../../../../etc/passwd
Pixelpost photoblog has local file include vulnerability in script index.php. Successful exploitation requires that "register_globals" is enabled.
TalkBack version 2.3.5 is vulnerable to a Local File Inclusion vulnerability. This vulnerability is due to the application not properly sanitizing user-supplied input to the 'language' parameter of the 'help.php' script. An attacker can exploit this vulnerability to include arbitrary local files from the web server, resulting in the disclosure of sensitive information.
A remote SQL injection vulnerability exists in Youtuber Clone. An attacker can send a specially crafted HTTP request to the vulnerable script ugroups.php with the parameter UID, which will allow the attacker to execute arbitrary SQL commands on the underlying database.
Pligg Beta 9.9.0 is vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to the database and execute arbitrary SQL commands.
A vulnerability exists in SiteAdmin CMS which allows an attacker to inject malicious SQL queries via the 'lng' and 'art' parameters in the 'line2.php' script. This can be exploited to gain access to the admin panel by manipulating the 'auth_users' table in the database.
An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable server. The attacker can inject malicious SQL queries in the vulnerable parameter ‘cate_id’. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation can allow the attacker to gain access to the database and compromise the application.
A remote SQL injection vulnerability exists in Getacoder Clone Script (sb_protype). An attacker can send a specially crafted HTTP request containing malicious SQL statements to the vulnerable script in order to execute arbitrary SQL commands in the back-end database.
A Local File Inclusion (LFI) vulnerability exists in CMScout 2.05 which allows an attacker to include a file from the local file system. An attacker can exploit this vulnerability by sending a crafted HTTP request containing directory traversal characters (e.g. '../') in the 'bit' parameter of the 'common.php' script. This can allow an attacker to read sensitive files from the server, such as configuration files containing database credentials. An attacker can also use this vulnerability to upload a malicious file to the server and execute arbitrary code.