Max's Image Uploader is vulnerable to a shell upload vulnerability. An attacker can upload a malicious file to the server and access it via the URL http://127.0.0.1/maxImageUpload/original/evil.php. This can be used to gain access to the server and execute arbitrary code.
This program acts as a web server that generates an exploit to target a vulnerability (CVE-2010-0249) in Internet Explorer. The exploit was tested using Internet Explorer 6 on Windows XP SP2. The exploit's payload spawns the calculator.
A buffer overflow vulnerability exists in MediaMonkey Standard 3.2.0, which could allow an attacker to execute arbitrary code on the vulnerable system. The vulnerability is due to a lack of proper validation of user-supplied input when handling a specially crafted MP3 file. An attacker can exploit this vulnerability by convincing a user to open a malicious MP3 file, resulting in arbitrary code execution in the context of the application.
The Ebay Clone from clone2009.com is vulnerable to multiple SQL Injection vulnerabilities. The vulnerable files are gotourl.php, product_desc.php, view_items.php, bidhistory.php and view_feedback.php. An attacker can exploit these vulnerabilities by sending malicious SQL queries to the vulnerable parameters. For example, sending the following query to the vulnerable parameter 'id' in the file gotourl.php will redirect the user to the version of the website: [HOST]/[PATH]/gotourl.php?id=-1+union+select+version()--
SQL Injection vulnerability exists in the cat_sell.php file, when the cid parameter is supplied with a malicious payload. An attacker can inject arbitrary SQL queries to the application. XSS vulnerability exists in the gen_confirm.php file, when the errmsg parameter is supplied with a malicious payload. An attacker can inject arbitrary JavaScript code to the application.
SQL Injection vulnerability exists in the 'selloffers.php' file, when the 'cid' parameter is supplied with malicious SQL code. XSS vulnerability exists in the 'gen_confirm.php' file, when the 'errmsg' parameter is supplied with malicious JavaScript code.
Rosoft Media Player 4.4.4 is vulnerable to a buffer overflow vulnerability when a specially crafted .m3u file is opened. This can be exploited to execute arbitrary code by corrupting the stack and overwriting the SEH handler with a custom crafted payload.
DasForum is vulnerable to a Local File Inclusion vulnerability due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability by sending a crafted HTTP request with a malicious 'layout' parameter value. This will allow the attacker to include arbitrary local files on the server, which can lead to the disclosure of sensitive information or the execution of arbitrary code.
PHP-RESIDENCE version 0.7.2 is vulnerable to Local File Inclusion (LFI) vulnerability. This vulnerability works only when magic_quotes_gpc is set to off. An attacker can exploit this vulnerability by sending a crafted HTTP request with malicious payload to the vulnerable application. This will allow the attacker to include and execute arbitrary local files on the server.
Transloader Script is vulnerable to unauthenticated file upload. An attacker can upload a malicious file to the server without authentication.