A remote code execution vulnerability exists in Microsoft Windows Media Player 9.0/10.0/11.0 due to a boundary error when processing a specially crafted ASX file. This can be exploited to execute arbitrary code by tricking a user into opening a malicious ASX file.
Mix Systems CMS is vulnerable to SQL injection. An attacker can exploit this vulnerability to gain access to sensitive information such as usernames, passwords, emails, etc. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with malicious SQL statements to the vulnerable script. Successful exploitation of this vulnerability can result in unauthorized access to sensitive information.
PacerCMS 0.6 is vulnerable to remote code execution. An attacker can exploit this vulnerability by sending a crafted request to the vulnerable application. The request should contain a malicious payload in the last_module parameter. The payload should be URL-encoded and should be of the form t{};%20class%20t{};passthru(ls);// or t{};%20class%20t{};include(URL-SHELL);//. This will allow the attacker to execute arbitrary code on the vulnerable system.
A vulnerability exists in SAPID CMF Build 87 (last_module) which allows remote attackers to execute arbitrary code. This is due to the application failing to properly sanitize user-supplied input to the 'last_module' parameter of the 'adodb-perf-module.inc.php' script. An attacker can exploit this vulnerability by passing a malicious payload to the 'last_module' parameter, which will be executed by the vulnerable script.
The vulnerability exists in the detail.php page, where an attacker can inject malicious SQL code in the item_id parameter. An example of the exploit is (SQL)=-1%20union+select+1,2,3,concat(user_name,0x3a,password),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36+from%20admin/*#
The vulnerability exists due to insufficient sanitization of user-supplied input in the 'num' and 'category' parameters of 'index.php' script. A remote attacker can execute arbitrary SQL commands in application's database, inject arbitrary HTML and script code, steal cookie-based authentication credentials and launch other attacks.
An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to access the database and execute arbitrary SQL commands.
This exploit is a local privilege escalation vulnerability in the Linux kernel. It is based on a race condition in the vmsplice system call. The exploit uses a trampoline code to overwrite the uid and gid of the current process, allowing it to gain root privileges. The exploit works on Linux versions 2.6.23 to 2.6.24.
This exploit allows remote attackers to execute arbitrary code on vulnerable installations of Journalness. Authentication is not required to exploit this vulnerability. The vulnerability is due to the 'includes/database/adodb-perf-module.inc.php' script not properly sanitizing user-supplied input to the 'last_module' parameter. An attacker can exploit this vulnerability to execute arbitrary code under the context of the webserver process.
This exploit allows an attacker to execute arbitrary code on a vulnerable Open-Realty version 2.4.3 or lower. The exploit requires the PHP configuration directive register_globals to be set to On. The exploit works by sending a crafted HTTP request to the vulnerable server, which includes the code to be executed. The code is then evaluated by the vulnerable server.