Klonet E-Commerce is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to manipulate SQL queries by injecting arbitrary SQL code. This may allow the attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
This PoC exploits the 'Create New Site' mechanism. Any site type that you pick will work. Because of differences in the internal process of each site type you may be able to get execution through one of these channels.
Core FTP LE v2.1 build 1612 is vulnerable to a local buffer overflow vulnerability when a user connects to a maliciously crafted FTP server. The vulnerability is triggered when a user connects to a maliciously crafted FTP server and the server sends a specially crafted response containing a large amount of data. This causes a buffer overflow in the application, which can be exploited to execute arbitrary code.
CDBurnerXP v 4.2.4.1351 is vulnerable to a local crash due to a Null Reference Exception. This vulnerability can be triggered by creating a new data disc, adding a folder, pasting to rename the folder, and clicking 'Save Compilation as ISO'. The crash occurs due to a lack of proper input validation when handling user-supplied data.
Mereo Web Server v1.8 is a Windows based HTTP server. This is the latest version of the application available. Mereo is vulnerable to remote arbitrary source code disclosure by the following means. http://[ webserver IP]/[ file ][.] http://[ webserver IP]/[ file ][::$DATA]
A SQL injection vulnerability exists in Joomla Component com_ircmbasic. An attacker can exploit this vulnerability to gain access to sensitive information stored in the database. The vulnerability is due to insufficient sanitization of user-supplied input in the 'p3' parameter of the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. Successful exploitation of this vulnerability can result in unauthorized access to sensitive information stored in the database.
This exploit causes CPU usage to go to 100% and prevent new connections on Core FTP Server 1.0, build 304 by sending malicious USER requests.
SAP GUI for Windows 7.1 and 6.4 contains ActiveX component EAI WebViewer3D ( file WebViewer3D.dll) Lib GUID: {AFBBE070-7340-11d2-AA6B-00E02924C34E} which is contains insecure method that can overwrite any file in system. Attacker can construct html page which call one of the wulnerable functions such as SaveToSessionFile or SaveViewToSessionFile from ActiveX component EAI WebViewer3D.
The vulnerability is a SQL injection vulnerability that allows an attacker to log in as the last logged in user by using the username ' OR HEATPass IS NOT NULL OR HEATPass = ' and the password ' OR HEATPass IS NOT NULL OR HEATPass = '.
This exploit allows an attacker to create a remote file on the target system using the MakeHttpRequest() method of the Persits.XUpload.2 control (XUpload.ocx). The attacker can specify the server, script, method, parameters, path, user agent, and headers of the request. In this example, the attacker is using the MakeHttpRequest() method to create a batch script that starts calc.exe in the Startup folder of the target system.