The vulnerability exists due to insufficient filtration of user-supplied data in the 'itemId' parameter of the 'index.php' script. A remote attacker can execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
A SQL injection vulnerability exists in Helpdesk Pilot Knowledge Base version 4.4.0 and lower. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to sensitive information stored in the database.
Mini-stream Ripper 3.0.1.1 is vulnerable to a buffer overflow vulnerability when a specially crafted .pls file is opened. This allows an attacker to execute arbitrary code on the vulnerable system.
This exploit is for Soritong MP3 Player 1.0 Universal BOF vulnerability. It is a buffer overflow vulnerability which allows an attacker to execute arbitrary code by overflowing the buffer with malicious code. The exploit is written in Python and uses a PPR from a .dll application file. It also uses additional NOPs for additional protection.
The vulnerability exists in the eStore v1.0.2 web application due to improper sanitization of user-supplied input in the 'cat_id' parameter of the 'store.php' script. A remote attacker can send a specially crafted HTTP request to the vulnerable script and execute arbitrary SQL commands in application's database.
Mini-Stream Ripper 3.0.1.1 is vulnerable to a buffer overflow vulnerability due to improper bounds checking of user-supplied input. An attacker can exploit this vulnerability by supplying a specially crafted .pls file, which when opened by the application, can lead to arbitrary code execution. The exploit uses a universal address from MSRcodec001.dll as the return address and a 4-byte pre-ESP area filler.
A remote file inclusion (RFI) vulnerability exists in ActiveKB 2005 1.0.0. An attacker can exploit this vulnerability to include a remote file containing malicious code and execute it on the vulnerable system. The vulnerable parameter is 'panelPHPFile' which is located in the 'class.template.php' file. An attacker can send a specially crafted HTTP request containing a malicious file URL in the 'panelPHPFile' parameter to execute arbitrary code on the vulnerable system.
The vulnerability allows an attacker to download the database of the Battle Blog application by accessing the URL http://server/Battle_Blog/database/blankmaster.mdb.
This exploit allows an attacker to create an administrator account on a DirectAdmin v1.34.0 server by sending a maliciously crafted HTTP request. The malicious request contains the username, email, and password of the account to be created. The request is sent to the CMD_ACCOUNT_ADMIN page, which is responsible for creating new accounts. This vulnerability can be exploited by an attacker to gain access to the server and perform malicious activities.
A vulnerability exists in Asp makit news/blog poster v3.1 which allows an attacker to download the database by accessing the URL http://server/makit/private/news.mdb.