An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable parameter 'spielerid' of the 'com_serie' component. This can allow the attacker to gain access to the database and execute arbitrary SQL queries.
A buffer overflow vulnerability exists in eZip Wizard 3.0, which allows an attacker to execute arbitrary code by sending a specially crafted .zip file. The vulnerability is due to the application not properly validating the length of user-supplied data prior to copying it to a fixed-length buffer. An attacker can exploit this vulnerability by sending a specially crafted .zip file to the vulnerable application. This will cause a stack-based buffer overflow, overwriting the SEH handler and allowing the attacker to execute arbitrary code.
A Local File Inclusion (LFI) vulnerability exists in Joomla Component Picasa version 2.0. An attacker can exploit this vulnerability to include arbitrary files from the web server and execute arbitrary code. The vulnerability is due to insufficient sanitization of user-supplied input to the 'controller' parameter in the 'index.php' script. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable script. Successful exploitation of this vulnerability can result in arbitrary code execution.
An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable parameter 'id' in the URL. An example of this exploit is http://127.0.0.1/index.php?option=com_press&task=view_details&id=-1+UNION+SELECT+1,2,3,4,5,6,7--
A vulnerability in the Joomla Component WISro Yahoo Quotes version 1.1.x allows an attacker to include local files on the server via a specially crafted URL. The attacker can send a malicious URL to the victim, which when clicked, can lead to the execution of arbitrary code on the server.
A Local File Inclusion (LFI) vulnerability exists in the com_redtwitter version 1.0.x component of Joomla. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. This request contains a maliciously crafted parameter value which can be used to include a malicious file from the server. This can be used to gain access to sensitive information or execute malicious code on the server.
A local file inclusion vulnerability exists in com_redshop version 1.0.x, which allows an attacker to include a file from the local system. This can be exploited to gain access to sensitive information or to execute arbitrary code. The vulnerability is due to insufficient sanitization of user-supplied input to the 'view' parameter in the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal sequences and a URL-encoded NULL byte (%00) to the vulnerable script. This can result in the disclosure of sensitive information or the execution of arbitrary code.
SAGU-PRO v1.0 is vulnerable to multiple Remote File Include vulnerabilities. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'DOCUMENT_ROOT' parameter of multiple scripts. An attacker can exploit this vulnerability to execute arbitrary remote code on the vulnerable system.
This code exploits a buffer overflow in the str_transliterate() function to call WinExec and execute CALC. The exploit requires that the 'unicode.semantics' setting in php.ini be set to 'on'.
MassMirror Uploader is prone to a remote file-inclusion vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code within the context of the vulnerable application. Failed exploit attempts will result in a denial-of-service condition.