This is a proof of concept code for exploiting Firebird 1.0.2 on FreeBSD 4.7-RELEASE. It provides three targets: gds_inet_server, gds_lock_mgr, and gds_drop. The code contains shellcode for each target.
ASPPortal is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
This exploit allows an attacker to include remote files in the ThinkEdit software. The vulnerability was discovered by r0ut3r and can be exploited by sending a specially crafted request. The vulnerability was found in ThinkEdit version 1.9.2.
The Beetel Connection Manager software is vulnerable to a SEH (Structured Exception Handler) Buffer Overflow. This vulnerability can be exploited by an attacker to execute arbitrary code on the target system.
Two vulnerabilities were discovered in the Wordpress plugin Cart66 version 1.5.1.14. The first vulnerability is a Cross-Site Request Forgery (CSRF) vulnerability that allows an authenticated Wordpress admin user to unknowingly add a product or alter an existing product on the site. The second vulnerability is a Stored XSS vulnerability that allows an attacker to inject malicious code into a vulnerable field.
Bitweaver fails to sanitize user-supplied data, leading to SQL injection and cross-site scripting vulnerabilities. Exploiting these vulnerabilities can result in the theft of authentication credentials, compromise of the application, unauthorized access or modification of data, and exploitation of latent vulnerabilities in the database implementation.
A vulnerability in the Amaya Web development server allows remote read access to files on the server's file system. By passing a malicious `templ` argument to the sendtemp.pl script, an attacker can traverse the file system and read files, such as the passwd file. This vulnerability occurs due to lack of input sanitization on the `templ` parameter.
Remote attackers can execute arbitrary machine code in the context of the vulnerable application, leading to the remote compromise of affected computers.
The DataWizard FtpXQ Server is prone to multiple remote vulnerabilities. The first vulnerability is a remote denial-of-service issue that occurs when the application fails to perform adequate bounds checks on user-supplied data before copying it to an insufficiently sized buffer. This can be exploited by an attacker to crash the application, denying access to legitimate users. The second vulnerability is due to the application creating two testing accounts by default. An attacker can access these accounts to gain read/write privileges on the server, potentially compromising the affected computer.
The application fails to validate input passed to the 'doc' parameter of the '/scripts/cruise/cms.exe' application, leading to a buffer overflow vulnerability.