This exploit is a buffer overflow vulnerability in Vermillion FTP Deamon version 1.31. It allows an attacker to execute arbitrary code on the vulnerable system by sending a specially crafted payload to the FTP server. The payload contains shellcode and a series of commands that overwrite the return address of the vulnerable function with the address of the shellcode.
Input var event_id is vulnerable to SQL Code Injection. A proof of concept is provided which shows that an attacker can execute arbitrary SQL queries.
During a brief assessment performed on a Xerox WorkCentre 4150 it was discovered that PJL daemon implementation contains a weakness related to robustness of PJL protocol handling. Attacker can crash the service with a relatively simple attack. Recovering from the denial-of-service condition requires power cycling the device. Due to the black box nature of this Proof of concept attack, we are unable to know if remote code execution is possible.
A Local File Inclusion vulnerability exists in phpunity.newsmanager, which allows an attacker to include a file from the local system. This can be exploited to view sensitive files on the system by including files from the web root folder or by exploiting a vulnerability in an included file. The vulnerability is located in the 'id' parameter of the 'tell.php' script. An attacker can send a specially crafted request to the vulnerable script and include a file from the local system.
An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable parameter 'category_id' in the URL. This can be done by appending a malicious SQL query to the vulnerable parameter in the URL. This can be done by appending a malicious SQL query to the vulnerable parameter in the URL. This can allow an attacker to gain access to sensitive information such as usernames and passwords stored in the database.
This PoC exploits a stack-based buffer overflow vulnerability in Wireshark 1.2.5. It sends a crafted packet to the LWRES service on port 921, which contains a large amount of data that overwrites the stack and allows control over EIP on Debian 5.0.3.
Input var eid is vulnerable to SQL Code Injection, allowing an attacker to execute arbitrary SQL queries.
Input var id is vulnerable to SQL Code Injection. It allows an attacker to execute arbitrary SQL queries. Proof of concept is provided in the text.
A Cross-Site Request Forgery (CSRF) vulnerability exists in the PHP Product Catalog application, which allows an attacker to change the administrator password. An attacker can craft a malicious HTML page containing a form with the necessary parameters to change the administrator password. When the administrator visits the malicious page, the form will be automatically submitted, and the administrator password will be changed.
A vulnerability in Joomla Component com_ccnewsletter allows an attacker to include a local file via a specially crafted URL. The attacker can send a request to the vulnerable server with a malicious URL containing a path traversal string (e.g. ../../../../../../../../../../etc/passwd%00) which will allow the attacker to read the contents of the file.