A vulnerability exists in Hot Links SQL / Hot Links SQL-PHP Version 3.2.0 which allows an attacker to set an admin cookie by using a malicious JavaScript code. This can be exploited to gain administrative access to the application.
An authentication bypass vulnerability exists in Submitter Script 2, which allows an attacker to gain access to the admin panel without valid credentials. This is due to the application not properly sanitizing user-supplied input before using it in an SQL query. An attacker can exploit this vulnerability by supplying a specially crafted username and password, such as ' or '1=1. This will cause the application to bypass authentication and grant the attacker access to the admin panel.
A vulnerability exists in ClickBank Directory Version 1.0.1 which allows an attacker to set an insecure cookie to gain access to the admin panel. The exploit code is 'javascript:document.cookie="clickbank=Logged+In;path=/";' and the vulnerable URL is 'http://www.mrcgiguy.com/clickbank/admin.php'.
This exploit is used to gain access to the StrawBerry 1.1.1 web application. It is a combination of Local File Inclusion (LFI) and Remote Command Execution (RCE). The exploit is triggered by sending a POST request to the vulnerable application with malicious code in the comment field. This code is then executed by the application, allowing the attacker to gain access to the application.
A directory traversal vulnerability exists in beLive version: v.0.2.3. An attacker can exploit this vulnerability to read arbitrary files from the server. This is done by sending a specially crafted HTTP request containing directory traversal characters (e.g. '../') to the vulnerable server. This can be exploited to read sensitive files from the server, such as the /etc/passwd file.
This is a local root exploit for the 2.6.29 ptrace_attach() race condition that allows a process to gain elevated privileges under certain conditions. The vulnerability is caused due to "ptrace_attach()" using an inadequate mutex while synchronizing with "execve()". This can be exploited to potentially execute arbitrary code with root privileges by attaching to a setuid process. The race is particularly narrow, this exploit checks that it has attached to the correct process before attempting to inject shellcode which helps reduce false positives and shells being spawned with lower privileges.
DigiMode Maya 1.0.2 is prone to a local buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. An attacker can exploit this issue to execute arbitrary code within the context of the application. Failed exploit attempts will result in a denial-of-service condition.
A SQL injection vulnerability exists in My Game Script V2.0, which allows an attacker to bypass authentication by entering a username of 'admin_name' or '1=1' and a blank password. This can be exploited by sending a specially crafted HTTP request to the vulnerable application.
Ascad Networks 5 products are vulnerable to insecure cookie handling. An attacker can set a cookie with the name 'c7portal' and value 'admin' to gain administrative access. The vulnerable products are c7 Portal v1.1.0, Password Protector SD v2 (ppSD2) and Form Processor Gold. The dork for c7 Portal is 'intitle:"c7 Portal by Ascad Networks"'
A vulnerability in MLFFAT 2.1 allows an attacker to gain administrative access by setting a malicious cookie. The cookie is set using a JavaScript code which sets the cookie to a value of 'OmFkbWluJyBvciAnMSc9JzE6MjEyMzJmMjk3YTU3YTVhNzQzODk0YTBlNGE4MDFmYzM='. This cookie can then be used to access the administrative control panel located at './cpanel/index.php'.