Bandsite is an online portal system designed for Bands. It has an admin section to manage overall data and configurations. An attacker can bypass authentication by sending a POST request to the admin.php page with the name and pass parameters set to 'hotturk'.
This program remotely exploits the most recent versions of GNU inetutils ftpd on linux systems. The exploit works by creating a shared library including a bindshell, creating a ld.so.preload file referencing the previously created shared library, connecting to the remote ftp server and logging in using the ftp account, uploading the shared library and ld.so.preload into /etc, and running /bin/ls. This results in a root shell.
This exploit is used to gain access to a server compiled with --enable-kbind. It uses a 72 byte findsckcode by LSD-pl to find the socket port and then uses a 1250+2+32 byte shellcode to gain access to the server.
ar_memberscript is a script used by many anime sites to manage their members, news, and some content, in some cases 'premium media'. The vulnerability is due to the lack of proper sanitization of user-supplied input to the 'script_folder' parameter in 'usercp_menu.php'. An attacker can exploit this vulnerability by sending a malicious URL to an unsuspecting user, which when clicked, will execute arbitrary code on the vulnerable system.
Oracle Portal is prone to multiple HTTP response-splitting vulnerabilities because the application fails to properly sanitize user-supplied input. A remote attacker may exploit these vulnerabilities to influence or misrepresent how web content is served, cached, or interpreted. This could aid in various attacks that attempt to entice client users into a false sense of trust.
This exploit allows an attacker to execute arbitrary code on a vulnerable system by hijacking a legitimate DLL file. The attacker must upload a malicious DLL file to the victim's desktop as one of the following hidden DLL files: sqmapi.dll, imageres.dll, or schannel.dll. When the victim runs IE7, the malicious DLL will be loaded and the attacker's code will be executed. This exploit was tested on Windows XP SP2 with fully patched IE7.
This exploit works with default proftpd 1.3.0a compiled with gcc 4.1.2 (ubuntu edgy). It builds a payload with the format on the stack as AAAA = EBX BBBB = ESI CCCC = EDI DDDD = EBP EEEE = EIP, and sends it to the control socket. This causes a buffer overflow, which can be used to execute arbitrary code.
A Remote File Inclusion (RFI) vulnerability exists in phpmycms, which allows an attacker to include a remote file, usually through a malicious URL, containing arbitrary code. This code is then executed on the vulnerable server.
The variable of phpEx & many variables are not sanitized, allowing attackers to inject malicious code into the application. This can be exploited to include arbitrary files from local or external resources, or to execute arbitrary PHP code.
A remote inclusion vulnerability exists in mx_modsdb v.1.0.0 due to insufficient sanitization of user-supplied input to the 'module_root_path' parameter in 'common.php'. An attacker can exploit this vulnerability to execute arbitrary remote code on the vulnerable system.