This exploit allows an attacker to grant or revoke dba permission to an unprivileged user in Oracle DBMS_CDC_SUBSCRIBE.ACTIVATE_SUBSCRIPTION. It has been tested on Oracle Database 10g Enterprise Edition Release 10.1.0.3.0.
The Interspire Knowledge Manager is prone to a vulnerability that allows attackers to create arbitrary files on a vulnerable computer. An attacker may exploit this issue to create arbitrary files, which may then be executed to perform unauthorized actions. This may aid in further attacks.
The CommodityRentals CD Rental Software is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
This exploit allows an attacker to grant or revoke dba permission to an unprivileged user in Oracle DBMS_METADAT.GET_DDL (9i/10g) versions. The attacker needs to have Oracle InstantClient (basic + sdk) installed for DBD::Oracle.
The vulnerability allows an attacker to bypass the 'safe_mode' restriction in PHP. By providing a specially crafted session_save_path parameter, an attacker can write session files in arbitrary directions.
An attacker may leverage these issues to execute arbitrary script code within the context of the webserver, steal cookie-based authentication credentials, obtain sensitive information, and execute arbitrary code or commands with superuser privileges. Other attacks are also possible.
The vulnerabilities allow an attacker to execute arbitrary script code, steal authentication credentials, obtain sensitive information, and execute arbitrary code or commands with superuser privileges.
The vBulletin Adsense component is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
The vulnerability exists due to inadequate boundary checks on user-supplied input in Helix Player. Successful exploitation could allow remote attackers to execute arbitrary code in the context of the application, while failed attempts may result in denial-of-service conditions.
This exploit crashes Snort 2.6.1 on Fedora Core 4. Code Execution may be possible, but not implemented in this exploit. Scapy is used to inject the packet. Install Scapy before using this exploit.