This exploit is for the FreeBSD-SA-08:08.nmount (CVE-2008-3531) vulnerability. It uses a mmap() to map a page of memory, then uses nmount() to write kernelcode to the mapped page. This kernelcode sets the uid and ruid of the current process to 0, thus granting root privileges.
Rentventory is vulnerable to SQL Injection and Blind SQL Injection. An attacker can exploit this vulnerability by sending malicious SQL queries to the application. The vulnerable parameter is 'product' which is not properly sanitized before being used in an SQL query. An attacker can use this vulnerability to gain access to the database and extract sensitive information.
A remote SQL injection vulnerability exists in Opial 1.0. An attacker can send a specially crafted HTTP request containing malicious SQL statements to the vulnerable application in order to gain access to unauthorized information or to manipulate data. The vulnerable parameter is 'albumid' which is not properly sanitized before being used in a SQL query.
A vulnerability in Opial Version 1.0 allows an attacker to bypass authentication by entering 'admin' or '1=1' as the username and leaving the password field empty. This allows the attacker to gain access to the admin panel.
An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable server. The attacker can inject malicious SQL queries in the vulnerable parameter 'nr' of the 'detail.php' script. This can be used to extract data from the database or to execute administrative operations on the database.
Almnzm 2.0 Blind SQL Injection Exploit is an exploit that allows an attacker to gain access to a database by exploiting a vulnerability in the Almnzm 2.0 web application. The vulnerability is caused by improper input validation, allowing an attacker to inject malicious SQL code into the application. This can be used to gain access to sensitive data, such as user credentials, or to modify the database in any way the attacker desires.
AdminLog 0.5 is vulnerable to a login bypass vulnerability when register_globals is set to ON. An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable application with valid_login=1 and loggedInUser=[VALIDUSER] parameters.
A privilege escalation vulnerability found in the Sensor and the DC web based management interfaces allows any local account to take over the appliances administrator role. While the 'user.cgi' PERL script correctly validates that incoming requests belong to an authenticated session, in such a case it also blindly grants read/write access to all accounts configuration with no regard for the role of the request's originator. Therefore a user with even the lowest level of access (ie. without any role configured) is able to promote himself as administrator and/or change others roles and account parameters at will. Depending of the role or roles initially configured for this user, access to the user management page may not be visible into the interface's layout however the underlying script itself is still reachable and can be invoked 'by hand'. A malicious operator named 'foobar' whose role has been restricted to 'Event analyst (read only)' can send a forged POST request to promote himself to administrator with full access into the management interface.
This exploit allows an attacker to download the database of a vulnerable YourTube 2.0 website. The attacker can then use the cookies to gain access to the admin control panel. The exploit is triggered by sending a GET request with the parameter 'Qabandi' set to any value.
This exploit is based on cursor injection and does not need create function privileges. It uses DBMS_SQL.OPEN_CURSOR, DBMS_SQL.PARSE, SYS.LT.CREATEWORKSPACE and SYS.LT.COMPRESSWORKSPACETREE functions to grant DBA privileges to the user 'scott'.