ccTiddly is a collaborative server side version of TiddlyWiki. This vulnerability exists due to insufficient sanitization of user-supplied input in the 'cct_base' parameter in the 'include.php' and 'workspace.php' scripts. A remote attacker can exploit this vulnerability to include arbitrary files from remote locations and execute arbitrary PHP code on the vulnerable system.
APBoard 2.1.0 / board.php?id= SQL Injection is a vulnerability that allows an attacker to inject malicious SQL code into a vulnerable web application. This can be exploited to gain access to sensitive data stored in the database, or to modify the data stored in the database. The vulnerability is present in versions 2.1.0 and earlier of APBoard. The exploit is triggered by sending a specially crafted HTTP request to the vulnerable web application, containing malicious SQL code. The malicious code is then executed by the web application, allowing the attacker to gain access to sensitive data or modify the data stored in the database.
sX-Shop is vulnerable to SQL injection. An attacker can inject malicious SQL queries via the 'product' and 'id' parameters in the 'index.php' and 'question.php' scripts, respectively. Additionally, the 'tell_a_friend.php' script is also vulnerable to SQL injection via the 'id' parameter.
Discovered by secret, sX-Shop / view_image.php SQL Injection vulnerability can be exploited by sending a malicious SQL query to the vulnerable parameter 'id' in view_image.php. An attacker can use this vulnerability to gain access to the database and execute arbitrary code.
This exploit is a proof of concept for a Denial of Service (DoS) vulnerability in Mediamonkey v. 3.2.1.1297. The vulnerability is triggered when a specially crafted MP3 file is opened, causing the application to crash. The vulnerable application can be found at http://www.mediamonkey.com/trialpay and the exploit has been tested on Windows XP SP2/3.
A buffer overflow vulnerability exists in FathFTP 1.8 ActiveX control when handling the FileExists method. An attacker can exploit this vulnerability to execute arbitrary code by sending a specially crafted request containing an overly long string to the vulnerable method. This can be exploited to execute arbitrary code by sending a specially crafted request containing an overly long string to the vulnerable method.
This exploit works for all the file extensions mentioned above. The user just needs to change the file extension below with the extension mentioned above. 35032 bytes are needed before overwriting EIP register. JMP ESP in SHELL32.DLL is used to bind a shell at TCP Port 5555 (Telnet to this port after exploiting target).
This exploit is a buffer overflow vulnerability in Progitek Visionner Photos v2.0. The exploit is triggered when a specially crafted JPG file is opened in the application. The file contains a large amount of data which causes a buffer overflow, allowing an attacker to execute arbitrary code on the vulnerable system. The exploit is written in Perl and creates a malicious JPG file which contains a large amount of data, causing the buffer overflow.
WordPress NextGEN Smooth Gallery plugin version 1.2 or lower is vulnerable to a Blind SQL injection vulnerability. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. This can allow the attacker to gain access to sensitive information stored in the database.
This exploit is used to jailbreak devices running Apple iOS. It originates in userland and gives root access to the devices.