This exploit is related to a Blind SQL Injection vulnerability in the Joomla Component MisterEstate. The exploit is used to extract the username and password of an administrator account by exploiting the vulnerability in the 'index.php?option=com_misterestate&act=mesearch&task=showMESR&tmpl=component' page. The exploit uses a loop to iterate through the characters of the username and password and then concatenates them to form the complete username and password.
Infinity version 2.X.X is vulnerable to Local File Disclosure and Authentication Bypass. An attacker can exploit this vulnerability by sending a crafted HTTP request with malicious parameters to the vulnerable application. This will allow the attacker to access sensitive information from the server and bypass authentication.
E Cms version 1.0 is vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to the database and execute arbitrary SQL commands.
A Remote File Include vulnerability exists in Autonomous LAN party version 0.98.3 and earlier. An attacker can exploit this vulnerability to include a remote file containing malicious code and execute it on the vulnerable system. The vulnerable parameter is 'master[currentskin]' in the '_bot.php' file.
This exploit allows an attacker to bypass authentication and reset the password of a 2WIRE Gateway device. The attacker can access the page http://gateway.2wire.net/setup/password_required.html to set a new password.
Xenorate Media Player 2.6.0.0 is vulnerable to a buffer overflow vulnerability when a specially crafted .xpl file is loaded. This can be exploited to execute arbitrary code by corrupting the SEH chain.
A stack-based buffer overflow vulnerability exists in broid 1.0 Beta 3a when handling .mp3 files. An attacker can exploit this vulnerability to execute arbitrary code in the context of the application. This vulnerability is due to a lack of proper bounds checking when handling .mp3 files. An attacker can exploit this vulnerability by enticing a victim to open a specially crafted .mp3 file.
This modem is used by many providers in the world like russia india and algeria [used by provider and all clients of 'Easy ADSL']. We can change easily the user and password admin and get full access to the modem. Go only here and set new user and password: http://192.168.1.1/adminpasswd.cgi
This vulnerability is caused by a buffer overflow in the setAttribute() method of Internet Explorer. When a long string is passed to the setAttribute() method, it causes a buffer overflow and can be used to execute arbitrary code. This vulnerability affects Internet Explorer versions 6 and 7 on Windows XP and Vista.
A stack overflow vulnerability was found in WebKit's JavaScript code that parses floating point numbers. It can be triggered with script like this: <script> var Overflow = "31337" + 0.313373133731337313373133731337...; </script> Or something like this: <img width=0.3133731337313373133731337... src="31337.jpg"> Play little bit with numbers to get a desirable return address, little bit of heap spraying, and it works.