This Perl script allows for remote command execution against Snitz Forums 3.3.03 and potentially other versions. The script prompts the user for the web server, port, and path to the 'register.asp' file. It then prompts for a command to execute non-interactively. The script sends a POST request with the command injected into the 'Email' parameter. The vulnerability allows an attacker to execute arbitrary commands on the target system.
This code exploits a race condition in kernel/kmod.c, which creates kernel thread in insecure manner. This bug allows to ptrace cloned process, allowing to take control over privileged modprobe binary. Should work under all current 2.2.x and 2.4.x kernels. I discovered this stupid bug independently on January 25, 2003, that is (almost) two month before it was fixed and published by Red Hat and others.
Campsite is prone to multiple remote file-include vulnerabilities. Exploiting this issue allows remote attackers to execute code in the context of the webserver.
Campsite is prone to multiple remote file-include vulnerabilities. Exploiting this issue allows remote attackers to execute code in the context of the webserver.
Remote attackers can execute code in the context of the webserver by exploiting these vulnerabilities in Campsite.
The Campsite application is prone to multiple remote file-include vulnerabilities. Exploiting these vulnerabilities allows remote attackers to execute arbitrary code in the context of the webserver.
Campsite is prone to multiple remote file-include vulnerabilities. Exploiting this issue allows remote attackers to execute code in the context of the webserver.
Campsite is prone to multiple remote file-include vulnerabilities. Exploiting this issue allows remote attackers to execute code in the context of the webserver.
The Campsite CMS is prone to multiple remote file-include vulnerabilities. Exploiting this issue allows remote attackers to execute arbitrary code in the context of the web server. The vulnerability is due to insufficient input validation in the 'ArticleAttachment.php' script. A remote attacker can exploit this issue by sending a specially crafted HTTP request containing a malicious file path to the vulnerable script. Successful exploitation will result in the inclusion of the attacker's file, which will be executed in the context of the web server.
Campsite is prone to multiple remote file-include vulnerabilities. Exploiting this issue allows remote attackers to execute code in the context of the webserver.