Xerver v4.32 is a Windows based HTTP server. This is the latest version of the application available. Xerver v4.32 is vulnerable to remote arbitrary source code disclosure by the following means. An attacker can send a specially crafted HTTP request containing a '::$DATA' string to the vulnerable server in order to view the source code of the requested file. This vulnerability can be exploited remotely.
Input passed via the 'h_id' & 'id' parameter in longDesc.php are not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. It can also be exploited to inject arbitrary HTML and script code into a user's browser to be executed within the security context of the affected site.
A SQL injection vulnerability exists in PHP-IPNMonitor, which allows an attacker to execute arbitrary SQL commands via the maincat_id parameter in the index.php file. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable application. This can result in the disclosure of sensitive information from the database, such as username and password.
This exploit takes advantage of a vulnerability in port 1723 of a device, which allows an attacker to send a few bytes to the port and cause the device to restart almost instantly.
A certain debugging component in IBM AIX 5.3 and 6.1 does not properly handle the (1) _LIB_INIT_DBG and (2) _LIB_INIT_DBG_FILE environment variables, which allows local users to gain privileges by leveraging a setuid-root program to create an arbitrary root-owned file with world-writable permissions, related to libC.a (aka the XL C++ runtime library) in AIX 5.3 and libc.a in AIX 6.1 (CVE-2009-2669).
This exploit is a SEH overwrite vulnerability in Kolibri+ Webserver 2. It was written by blake and tested on Windows XP SP 1. It was discovered by Usman Saeed and allows for the creation of a user with the username jenny and the password pass.
A directory traversal vulnerability exists in Kolibri+ Webserver 2, which allows an attacker to read arbitrary files on the server. An attacker can send a specially crafted HTTP request containing directory traversal sequences (e.g. '../') to read arbitrary files on the server.
This exploit is a denial of service attack against FreeRADIUS servers. It requires the use of the RadiusAttr library from Scapy. The exploit sends a malformed packet to the FreeRADIUS server, causing it to crash.
This exploit is a third version of the Linux Sendpage exploit which features complete support for i386, x86_64, ppc and ppc64. It also includes the personality trick published by Tavis Ormandy and Julien Tinnes, the TOC pointer workaround for data items addressing on ppc64, improved search and transition to SELinux types with mmap_zero permission.
Image voting 1.0 is vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability to gain access to the database and execute arbitrary SQL commands. The vulnerability is due to insufficient sanitization of user-supplied input in the 'show' parameter of the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. Successful exploitation of this vulnerability can result in unauthorized access to the database and execution of arbitrary SQL commands.