This vulnerability allows an attacker to remotely access and disclose files on the target system. By sending a specially crafted request to the download.php script with a file name parameter, an attacker can retrieve sensitive files from the target system.
This vulnerability allows remote attackers to include arbitrary files via a URL in the ains_path parameter in ains_main.php.
The vulnerability exists in the package.php file of MyPHPCommander. It is caused by the insecure usage of the gl_root parameter, which can be exploited to execute arbitrary PHP code remotely. An attacker can inject a malicious command through the gl_root parameter, leading to remote code execution on the server.
This script demonstrates a proof of concept for the MOAB-25-01-2007 vulnerability. It starts an HTTP server on the specified port (default 80) and waits for incoming connections. When a connection is made, it generates a random content length and extracts the user agent from the request. It then responds with a 301 redirect to a non-existent URL and sends a response body filled with 'X' characters of the random content length. This vulnerability can be used for HTTP server redirection attacks.
This exploit allows an attacker to escalate their privileges on a system by executing arbitrary commands with root privileges. By running a specially crafted Perl script with SUID permissions, the attacker can bypass normal permission checks and gain unauthorized access to system resources.
This exploit takes advantage of a buffer overflow vulnerability in the .ShellClassInfo section of the Windows operating system. It allows an attacker to execute arbitrary code by providing a specially crafted URL. The exploit contains shellcode that downloads and executes additional code from a remote location.
VCDGEAR 3.50 is prone to a stack-based buffer overflow vulnerability because the application fails to perform adequate boundary-checks on user-supplied input. An attacker can exploit this issue to execute arbitrary code in the context of the application. Failed exploit attempts will result in a denial-of-service condition.
This module exploits a buffer overflow in Total Video Player 1.3.1. The vulnerability occurs opening malformed Settings.ini file e.g."C:Program FilesTotal Video Player". This module has been tested successfully over Windows WinXp-Sp3-EN
This module abuses the gefebt.exe component in GE Proficy CIMPLICITY, reachable through the CIMPLICITY CimWebServer. The vulnerable component allows to execute remote BCL files in shared resources. An attacker can abuse this behaviour to execute a malicious BCL and drop an arbitrary EXE. The last one can be executed remotely through the WebView server. This module has been tested successfully in GE Proficy CIMPLICITY 7.5 with the embedded CimWebServer. This module starts a WebDAV server to provide the malicious BCL files. When the target hasn't the WebClient service enabled, an external SMB service is necessary.
The vulnerability allows an attacker to read files outside the intended directory by manipulating the 'phpbb_root_path' parameter in the 'configure.php' script. This can be exploited by appending a path traversal string like 'Evil?' to the URL.