This exploit is modified from Shirkdog's PoC and exploits the stack-based buffer overflow in the different manner using heap spraying technique to injection shellcode in the heap. This exploit tested on Windows XP SP2 + IE6 SP1, Windows XP SP1 + IE6 SP1, Windows XP SP0 + IE6, Windows 2000 SP4 + IE6 SP1 and Windows 2000 SP4 + IE6.
A Remote File Include vulnerability exists in syntaxCMS due to the inclusion of user-supplied input in the '0004_init_urls.php' script. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request containing a URL in the 'init_path' parameter, which will be included in the vulnerable script. This can allow an attacker to execute arbitrary code on the vulnerable system.
An SQL injection vulnerability exists in iyzi Forum s1 b2 (tr) due to improper sanitization of user-supplied input to the 'uye_ayrinti.asp' script. An attacker can exploit this vulnerability to gain access to the application's database and execute arbitrary SQL commands. The password is encrypted with SHA-256.
AdVancedClanscript version 3.4 and below is vulnerable to a Remote File Inclusion vulnerability. This vulnerability is due to a failure in the application to properly sanitize user-supplied input to the 'content' parameter of the 'mcf.php' script. This may allow a remote attacker to include a file from a remote host that contains arbitrary code and execute it in the context of the webserver process. This may facilitate unauthorized access.
SpideyBlog 1.5 is vulnerable to a SQL injection vulnerability. This vulnerability allows an attacker to gain access to the administrator's username and password. The exploit is triggered by sending a specially crafted HTTP request to the vulnerable application. The exploit code is written in Perl and is available on milw0rm.com.
A remote file inclusion vulnerability exists in ZoomStats, due to the $GLOBALS['lib']['db']['path'] array not being declared. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing a malicious URL in the GLOBALS['lib']['db']['path'] parameter to the vulnerable page, mysql.php, located in the /libs/dbmax/ directory.
This exploit allows an attacker to gain access to the e-Vision CMS database by exploiting a SQL injection vulnerability in the all_users.php file. The attacker can then extract the username and password of the admin user from the database.
This exploit allows an attacker to inject malicious SQL queries into the Eskolar CMS application, which can be used to gain access to the application's database and potentially gain access to sensitive information.
xweblog <= 2.1 (tr) (kategori.asp) is vulnerable to a Remote SQL Injection vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to sensitive information from the database, such as usernames and passwords.
Wili-CMS is vulnerable to multiple input validation vulnerabilities. These vulnerabilities include remote include, XSS, and full path disclosure. An attacker can exploit these vulnerabilities to gain access to sensitive information, execute arbitrary code, and gain access to the underlying system.