An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable application. The attacker can inject malicious SQL queries in the vulnerable parameter and execute arbitrary SQL commands on the underlying database.
phpCMS system has remote File Disclosure vulnerability in page /parser/include/class.cache_phpcms.php. Attacker can read any files in web directory by appending a valid extension with null byte to file like a “%00.gif” or smth. Also attacker can read admin password from file /parser/include/config.php.
A vulnerability exists in Chilkat Mail ActiveX 7.8 (ChilkatCert.dll) which allows an attacker to write arbitrary files to the system. This is due to the insecure use of the SaveLastError method which allows an attacker to specify a file path and write arbitrary data to it.
This exploit is a local kernel ring0 indirect call SYSTEM exploit which is used to exploit the vulnerability in Safenet IPSecDrv.sys <= 10.4.0.12. It uses user definable offset used in an indirect call. It is tested on IPSecDrv.sys 10.4.0.12 bundle with SafeNET HighAssurance Remote, SoftRemote and Microsoft Windows 2003 SP2. It is compiled using MinGW and -lntdll.
Smart Publisher 1.0.1 is vulnerable to Remote Code Execution due to an insecure usage of the 'eval()' function in '/admin/op/disp.php' in line 3. An attacker can exploit this vulnerability by sending a maliciously crafted 'filedata' parameter in the URL. For example, sending 'cGhwaW5mbygp' as the 'filedata' parameter will execute the 'phpinfo()' function.
There is a SQL Injection vulnerability in the main_bigware_53.tpl.php file of Bigware Shop 2.0. An attacker can exploit this vulnerability by sending a crafted HTTP request with a malicious pollid parameter. This will allow the attacker to view the admin's email address and salted password hash.
A vulnerability in bubbling library v1.32 allows remote attackers to disclose arbitrary files from the server. This is due to the lack of proper input validation in the 'uri' parameter of the 'dispatcher.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal sequences (e.g. '../') to the vulnerable script. This will allow the attacker to read arbitrary files from the server.
A Local File Inclusion vulnerability exists in phpMyClub, which allows an attacker to include a file from the local system. The vulnerability is due to insufficient sanitization of user-supplied input to the 'page_courante' parameter in the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal characters ('../') to the vulnerable script. This can allow the attacker to include arbitrary files from the local system, resulting in the disclosure of sensitive information.
A vulnerability exists in MailBee Objects v5.5 (MailBee.dll) which allows an attacker to save files to the system and create files on the system. This is due to the application not properly validating user-supplied input before using it to execute system commands. An attacker can exploit this vulnerability to save files to the system and create files on the system.
This exploit allows an attacker to change the system password of Oracle 10g R1 by exploiting a SQL Injection vulnerability in the XDB.XDB_PITRIG_PKG.PITRIG_DROP package. The exploit was written by Alexandr 'Sh2kerr' Polyakov and was tested on Oracle 10.1.0.2.0.