A remote attacker may leverage this condition to overwrite sensitive program control variables and thus gain control of the process's execution flow.
The bBlog application is prone to an SQL injection vulnerability. This vulnerability occurs due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. An attacker can exploit this vulnerability by injecting malicious SQL statements into the 'postid' parameter of the application's URL. Successful exploitation of this vulnerability could lead to a compromise of the application, disclosure or modification of data, or allow the attacker to exploit vulnerabilities in the underlying database implementation.
This module exploits a buffer overflow vulnerability found in ERS Viewer 2011 (version 11.04). The vulnerability exists in the module ermapper_u.dll where the function ERM_convert_to_correct_webpath handles user provided data in a insecure way. It results in arbitrary code execution under the context of the user viewing a specially crafted .ers file. This module has been tested successfully with ERS Viewer 2011 (version 11.04) on Windows XP SP3 and Windows 7 SP1.
The vulnerability occurs when an erroneous TCP acknowledgement number is encountered in an active TCP session stream. This can result in a degradation of the target connection, effectively denying service for legitimate users. It may also cause CPU performance degradation on the attacked computer, potentially denying service for local users as well.
Multiple local command injection web vulnerabilities are detected in the mobile SimpleTransfer Photo 2.2.1 iOS app (Apple - iPad|iPhone).
Wireless Photo Access 1.0.10 iOS is prone to multiple vulnerabilities including arbitrary file upload, cross-site scripting and remote code execution vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in the context of an arbitrary code execution vulnerability. An attacker can exploit these issues to upload arbitrary files, execute arbitrary script code in the context of the affected site, steal cookie-based authentication credentials, and perform unauthorized actions. This may aid in launching further attacks.
Multiple web vulnerabilities in Wireless Disk PRO v2.3 iOS allow remote attackers to execute arbitrary code or bypass authentication via a crafted request.
The Ajax Availability Calendar 3.X.X script is vulnerable to SQL Injection, Reflected XSS, and Full Path Disclosure vulnerabilities. The SQL Injection vulnerability allows an attacker to execute arbitrary SQL commands through the 'id_item' parameter, leading to unauthorized access to the database. The Reflected XSS vulnerability allows an attacker to inject malicious scripts into the 'id_item' parameter, potentially leading to the execution of arbitrary code in the victim's browser. The Full Path Disclosure vulnerability allows an attacker to obtain the full path of the script, which may aid in further attacks.
This exploit code is a Proof of Concept (PoC) that causes Windows Media Player 11.0.0 to crash when handling a .wav file. The exploit is written in perl and is created by Asesino04.
This program logs into a CISCO router and tries a list of passwords looking for the enable one. It works in password-only CISCO as well as login-pass ones and has been successfully tested on many 2600 and a few 12008 routers. The program's concept is quite simple, bruteforcing a router for gaining enable access. This program has not been seen before.