A SQL injection vulnerability was discovered in Ziggurat Farsi CMS. An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable parameter 'grp' in the 'main.asp' file. This can allow the attacker to gain access to the database and execute arbitrary code.
ASX to MP3 Converter Version 3.1.2.1 (2010-03-30) is vulnerable to a local buffer overflow vulnerability due to improper bounds checking of user-supplied input. An attacker can exploit this vulnerability by supplying a specially crafted .m3u file with malicious code, which will be executed when the file is opened. This vulnerability can be exploited to execute arbitrary code in the context of the application.
This exploit allows an attacker to add an FTP account to a Cpanel 11.25 server. The attacker can craft a malicious HTML page with a form containing the necessary parameters to add an FTP account. When a user visits the malicious page, the form will be automatically submitted and the FTP account will be added.
A vulnerability exists in Who is Chatting 2.2.3, which allows an attacker to include a remote file via the TMPL[path] parameter in the header.php file. This can be exploited to execute arbitrary PHP code by including a malicious PHP file from a remote location.
This exploit sends a malicious DHCP request to the target DHCP server, causing it to crash.
SweetRice 0.6.4 is vulnerable to a remote file upload vulnerability. An unauthenticated attacker can upload files with certain extensions to the server. This can be exploited to upload malicious files such as webshells, leading to remote code execution.
This vulnerability is because of using Alternate Data Stream to open a protected folder. All of IIS authentication methods can be circumvented. In this technique, we can add a “:$i30:$INDEX_ALLOCATION” to a directory name to bypass the authentication.
Xplico is vulnerable to Cross-Site Scripting vulnerability. An attacker can use the 'POST' to take advantage of this vulnerability, injecting code into the web pages viewed by other users.
The arbitrary file upload is possible due to two filters bypassing. The content-type can be bypassed using a crafted HTTP packet. The file extension filter can be bypassed using the php5 extension instead of php extension. The malicious file will be renamed and copied in member_photos directory, that sometimes has a 777 permission. Using this vulnerability a user can execute arbitrary php code.
This exploit is a proof of concept for a stack overflow vulnerability in Mp3 Digitalbox 2.7.2.0. The vulnerability is triggered when a specially crafted .mp3 file is opened, causing a buffer overflow and allowing arbitrary code execution. The exploit code creates a file containing 500 A characters, which when opened in Mp3 Digitalbox, causes the stack overflow.