Xorg-x11-xfs Race Condition Vuln local root exploit is a vulnerability in the Xorg-x11-xfs service which allows a local user to gain root privileges. The vulnerable code is located in the start() function of the /etc/init.d/xfs script, which creates a directory with world-writable permissions and then fails to remove it. This allows a local user to create a symlink to a file of their choice, which is then overwritten by the root user when the xfs service is restarted. This exploit was discovered in 2007 and affects xorg-x11-xfs versions <= 1.0.2-3.1.
This exploit is used to gain access to the admin credentials of a MultiCart 2.0 website. The exploit is done by using a blind SQL injection vulnerability in the productdetails.php page. The exploit requires the user to register first and then use the login credentials to gain access to the admin credentials.
This exploit allows an attacker to bypass authentication in PunBB 1.2.16. The exploit works by using the 'forget_2' action in the login.php page to reset the admin password. The attacker then uses the reset password to log in as the admin.
This exploit is used to gain access to the WoltLab Burning Board 3.0.X by exploiting a SQL injection vulnerability. The exploit is done by sending a malicious GET request to the server, which contains a crafted SQL query. The query is designed to extract the password of the user with userID=1 from the wcf1_user table. The exploit is successful if the server takes more than 10 seconds to respond. The exploit is written in PHP and requires the user to edit the host and path variables.
The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'cid' parameter to 'modules.php' script. A remote attacker can execute arbitrary SQL commands in application's database and gain access to sensitive information. Successful exploitation requires that 'magic_quotes_gpc' is disabled.
Globsy 1.0 is vulnerable to a remote file disclosure vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. The request should contain the file parameter with a value of 'globsy_config.php' or '../../../../../../../etc/passwd'. If the request is successful, the server will respond with the contents of the requested file.
A remote SQL injection vulnerability exists in php-nuke modules Docum. An attacker can exploit this vulnerability to gain access to the database and execute arbitrary SQL commands. This vulnerability is due to an error in the 'modules.php' script when handling the 'artid' parameter. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. Successful exploitation will result in execution of arbitrary SQL commands.
An attacker can exploit this vulnerability by sending a crafted HTTP request with malicious SQL statements to the vulnerable application. This can allow the attacker to gain access to sensitive information from the database, modify data, or execute system level commands.
A remote SQL injection vulnerability exists in PHP-NUKE Modules Okul v1.0. An attacker can exploit this vulnerability to gain access to the database and execute arbitrary SQL commands. This is done by sending a specially crafted HTTP request to the vulnerable application containing malicious SQL statements in the 'okulid' parameter.
The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'cid' parameter to '/modules/classifieds/index.php' script. A remote attacker can execute arbitrary SQL commands in application's database and gain access to sensitive information. Successful exploitation requires that 'register_globals' is set to 'On'.