PUMA 1.0 RC 2 is vulnerable to Remote File Inclusion due to the lack of proper sanitization of the $fpath variable before being used. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable server.
This exploit is used to gain root access on a system by exploiting a buffer overflow vulnerability in openmovieeditor. The exploit creates a file with malicious code and executes it using the openmovieeditor program. The malicious code contains a return address which is used to gain root access on the system.
The vulnerability exists due to the use of user-supplied input in the 'classified_path' parameter of the 'HTML_Category_Menu()' function in 'HTML_function.php' without proper validation. This can be exploited to include arbitrary files from remote locations by supplying an URL in the 'classified_path' parameter.
This exploit allows an attacker to execute arbitrary code on the vulnerable server by including a file from a remote web server through a vulnerable script on the web server.
MyABraCaDaWeb v1.0.3 is vulnerable to a Remote File Include vulnerability. This vulnerability allows an attacker to include a remote file, usually through a malicious URL, and execute it on the vulnerable server. This can lead to the attacker gaining access to sensitive information, such as passwords, or even full control of the server. The vulnerable URLs are http://www.site.com/[path]/index.php?base==[shell] and http://www.site.com/[path]/pop.php?base=[shell].
This exploit is a buffer overflow vulnerability in the X11R6 XKEYBOARD extension Strcmp() for SCO UnixWare 7.1.3 x86. It allows an attacker to execute arbitrary code by overflowing a buffer with malicious code. The exploit uses a NOP sled and shellcode to achieve code execution.
This exploit is a buffer overflow vulnerability in the X11R6 XKEYBOARD extension Strcmp() for Sun Solaris 8 9 10 x86. It allows an attacker to execute arbitrary code by overflowing a buffer with malicious code. The exploit uses a NOP sled and shellcode to achieve code execution.
An error accoured when sending a specified string code at include function Varibale scope at the line for request was not except how they handle failure.include() does not behave this way, the script will continue regardless.include() produces a Warning while require() results in a Fatal Error.
RaidenHTTPD is a web server software for Windows 98 / Me / 2000 / XP / 2003 platforms. It carries a PHP interpreter (4.4.1 version) and an administrative interface in /raidenhttpd-admin folder. However, unauthorized access to some scripts in /raidenhttpd-admin/slice folder is possible due to an uninitialized variable in check.php at line 35. Additionally, register_globals and allow_url_fopen are enabled by default.
PhotoKorn Gallery version 1.52 is vulnerable to a remote file inclusion vulnerability due to a lack of sanitization of user-supplied input. An attacker can exploit this vulnerability by supplying a malicious URL in the dir_path parameter of the cart.inc.php and ext_cats.php scripts. This can allow an attacker to execute arbitrary code on the vulnerable server.