Nishant Das Patnaik discovered multiple vulnerabilities in the Web Browser of the high end smartphones manufactured by Nokia running Symbian OS 3rd Edition. Attacker may exploit this flaw to make crash the browser of the victim or exhaust memory available to the browser.
My IE 8 on the address bar will automatically enter the url of the " (0x5c) transformed into "/" (0x2f). This feature can be exploited by phishing sites to bypass some security checks.
An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable server. The request contains a malicious SQL query in the form of a UNION statement that is appended to the original query. This statement allows the attacker to extract data from the database, such as usernames, passwords, and email addresses.
Multiple vulnerabilities exist in cmsmadesimple, including XSS and Local File Inclusion. XSS can be exploited by sending a malicious URL to the victim, such as http://localhost/cmsmadesimple/index.php?page=tags-in-the-core&showtemplate=false"><script>alert('XSS')</script>. Local File Inclusion can be exploited by sending a malicious URL to the victim, such as http://server/cmsmadesimple/index.php?mact=News%2ccntnt01%2c%5c..%5c..%5c%5c..%5c..%5c%5c..%5c..%5c%5c..%5c..%5c%5cboot.ini%00%2c0&cntnt01articleid=1&cntnt01showtemplate=false&cntnt01returnid=39
This module exploits a stack-based buffer overflow within HyleosChemView.ocx of Hyleos ChemView 1.9.5.1 By setting an overly long value to 'SaveAsMolFile()', an attacker can overrun a buffer and execute arbitrary code.
This exploit is a pre-authentication remote exploit for Open & Compact FTPd. It was originally discovered by loneferret and tested on XPSP2. The exploit is written in Python and uses a shellcode to gain access to the system. The shellcode is encoded using the shikata_ga_nai encoder and is 369 bytes in size. The exploit sends a malicious MKD command to the FTP server, which then triggers the buffer overflow and executes the shellcode.
Alqatari group Version 1.0 is vulnerable to Blind SQL Injection. An attacker can exploit this vulnerability by sending malicious SQL queries to the server. The attacker can use the true/false condition to check if the query is valid or not. For example, sending a request with 'id=246 and 1=1' will return true and 'id=246 and 1=2' will return false.
Izumi version 1.1.0 and below is vulnerable to Remote File Inclusion (RFI) and Local File Inclusion (LFI) attacks. The vulnerability exists in the page.php file, which allows an attacker to include malicious files from remote or local sources. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing a malicious file path in the dir_install and dir_src parameters.
A directory traversal vulnerability exists in Infragistics WebHtmlEditor.v7.1 which allows a remote user to view files local to the target server. The parameters of the InitialDirectory ( InitialDirectory =../../ ) can be manipulated to enable directory travel. Additionally, the parameters of the InsertImage the iged_uploadid can be changed to enable Arbitrary File upload.
This exploit is for CastRipper 2.50.70, which is vulnerable to a stack overflow vulnerability. The exploit is written in Perl and uses a PexAlphaNum encoder to generate a shellcode. The exploit creates an ASX playlist file with a malicious URL containing the shellcode, which when opened in CastRipper, will execute the shellcode.