Simple PHP Blog version 0.4.7.1 and below is vulnerable to arbitrary local inclusion vulnerability. This vulnerability can be exploited by an attacker to inject malicious code into the Apache log file and execute arbitrary commands on the server. This vulnerability requires magic_quotes_gpc to be set to Off.
Ubuntu Breezy stores the installation password in plain text in two vulnerable files, /var/log/installer/cdebconf/questions.dat and /var/log/debian-installer/cdebconf/questions.dat. An attacker can use the Kristian Hermansen's 'Eazy Breezy' Password Recovery Tool to extract the password from these files.
This exploit is a remote code execution vulnerability in PeerCast <=0.1216. It allows an attacker to execute arbitrary code on the vulnerable system by sending a malicious payload to the target system. The payload contains shellcode that binds a port and allows the attacker to gain access to the system.
Jupiter CMS (http://www.highstrike.net/) is a dynamic CMS system like mambo or limbo, allowing users to subscribe and posts events. Because no filtering is done upon [image] BBcode input, any user is capable of inserting arbitrary javascript code, allowing for credential theft leading/session hijacking and possibly site defacement. Examples of this include making a messagebox pop up saying 'XSS', stealing session ID's, and redirecting users to a page of the attacker's choice.
A remotely exploitable buffer overflow has been identified by INFIGO-2006-03-01 which can be potentially exploited to execute arbitrary code due to insufficient bounds checking on a memory copy operation occuring on the stack. All versions upto and prior to v0.1216 are believed to be vulnerable. Return address does a "jmp esp" which references the start of our shellcode and as such will work on multiple distributions and VA randomized hosts.
This exploit is based on a vulnerability in the Dropbear and OpenSSH Server code. The vulnerable code is in svr-main.c, where the MAX_UNAUTH_CLIENTS variable is not properly checked. This allows an attacker to send a large number of connections to the server, causing it to crash.
This exploit allows an attacker to add an admin account to the Jiros Banner Experience Pro application without authorization. The attacker can use the given dork to find vulnerable sites and then use the exploit to add an admin account with the given username, email, and password. The exploit is triggered when the attacker submits the form.
A vulnerability in D2KBLOG allows an attacker to extract the administrator password by sending a specially crafted HTTP request. This is due to the application not properly sanitizing user-supplied input before using it in an SQL query.
This exploit allows an attacker to execute arbitrary commands on a vulnerable system. It works with register_globals = On and magic_quotes_gpc = Off. The attacker needs valid user credentials to upload a watermark.
CilemNews System version 1.1 is vulnerable to a SQL injection vulnerability in the 'yazdir.asp?haber_id=' parameter. An attacker can exploit this vulnerability to gain access to the admin panel of the application. The attacker can use the '1%20union%20select%200,admin,sifre,0,0,0,0,0,0,0,0,0,0,0%20from%20ayarlar%20where%20admin=admin' payload to exploit this vulnerability.