PAPOO version 3_RC3 is vulnerable to SQL injection and admin credentials disclosure. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. This will allow the attacker to gain access to the admin credentials.
Pivot <= 1.30 RC2 is vulnerable to a privilege escalation vulnerability due to the lack of proper input validation. An attacker can exploit this vulnerability to execute arbitrary commands on the vulnerable system.
A small heap overflow occurs each time this property is set. The bug is difficult to detect unless heap verification has been enabled in the global debug flags for iexplore.exe. The demonstration below results in a possibly exploitable heap corruption after 128 or more iterations of the property set.
The vulnerability exists due to a boundary error when handling certain combinations of elements in a DOM tree. An attacker can exploit this vulnerability by creating a malicious web page containing a specially crafted combination of elements and then convincing a user to view the page. This can result in a buffer overflow, allowing the attacker to execute arbitrary code on the user's system with the privileges of the user.
An attacker can gain reseller privileges and after that can gain admin privileges by exploiting a bug in the hosting/addreseller.asp file of HostingController 6.1 Hotfix <= 3.1. The bug allows an attacker to inject malicious code into the file, which can be used to gain access to the system. The attacker can then use the code to gain access to the system and gain admin privileges.
This exploit was originally written by Manuel Santamarina Suarez, but it was working by clicking on the link and then on the 'Yes' button. In this version of exploit the author adds the RET address for Microsoft Office Excel 2003 (Italian; 11.5612.5606) and removed user confirmation by 'Yes' button. The exploit now simply works by clicking on the link.
This exploit is a stack overflow vulnerability in WinRAR 3.60 beta 4. It allows an attacker to execute arbitrary code by creating a malicious SFX archive. The malicious SFX archive contains a comment.txt file which contains the malicious code and a sample.exe file which contains the shellcode. When the SFX archive is opened, the malicious code is executed.
A vulnerability exists in WonderEdit Pro CMS Pro version, which allows attackers to include remote files. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious code to the vulnerable application. This can result in arbitrary code execution on the vulnerable system.
A Remote File Inclusion vulnerability exists in the galleria component of Joomla! 1.0. An attacker can exploit this vulnerability to execute arbitrary PHP code on the vulnerable system by sending a specially crafted HTTP request containing a malicious URL. The malicious URL contains the path to the vulnerable file and the malicious PHP code to be executed.
A denial of service vulnerability exists in ImgSvr.exe due to an overly long HTTP post request. Sending an overly long post request will crash the server with an access violation error. This vulnerability was tested on Windows XP SP1.