Satel Lite is prone to a local file-include vulnerability because it fails to sufficiently sanitize user-supplied data. Exploiting this issue may allow an attacker to access sensitive information and to execute local script code in the context of the application; this may facilitate other attacks against the affected computer.
Advanced exploit code for catastrophic kernel bug that allows a local attacker to crash the affected application and potentially execute arbitrary code with elevated privileges.
Mephisto Blog is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
This exploit targets a SEH buffer overflow vulnerability in Light Alloy v4.7.3. By creating a specially crafted .m3u file, an attacker can overwrite the SEH handler and execute arbitrary code. The exploit utilizes unicode venetian alignment to bypass memory protections. Once exploited, the payload launches the Windows calculator (calc.exe).
CcCounter is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
The Image_Upload Script is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data. Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
Multiple remote file-include vulnerabilities exist in Free File Hosting due to insufficient sanitization of user-supplied data. Exploiting these vulnerabilities can lead to compromise of the application and the underlying system, as well as other possible attacks.
The Free File Hosting application fails to properly sanitize user-supplied data, leading to multiple remote file-include vulnerabilities. Exploiting these vulnerabilities can result in compromising the application and the underlying system, as well as enabling other types of attacks.
Free File Hosting is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data. Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
KDE Konqueror is prone to a vulnerability that may allow attackers to obtain potentially sensitive information. A successful exploit of this issue would cause the affected application to connect to arbitrary TCP ports and potentially reveal sensitive information about services that are running on the affected computer. Information obtained may aid attackers in further attacks.