InterPhoto Image Gallery is prone to a local file-include vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this vulnerability to obtain potentially sensitive information and to execute arbitrary local scripts in the context of the webserver process. This may allow the attacker to compromise the application and the computer; other attacks are also possible.
This exploit allows an attacker to overwrite the Structured Exception Handler (SEH) of the FutureSoft TFTP Server 2000, leading to remote code execution. The exploit opens a shell on port 5555 of the remote server.
Pragyan CMS is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.
VidiScript is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
The Linux Kernel epoll Subsystem is prone to multiple local denial-of-service vulnerabilities. Successful exploits will allow attackers to cause the kernel to hang, denying service to legitimate users.
The Linux Kernel epoll Subsystem is prone to multiple local denial-of-service vulnerabilities. Successful exploits will allow attackers to cause the kernel to hang, denying service to legitimate users.
Forritun is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
The BackWPup plugin for WordPress is prone to multiple information-disclosure vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to retrieve the contents of an arbitrary file. Information obtained may aid in launching further attacks.
The exploit allows for injecting a buffer of more than 2000 bytes using an IMAP command, specifically the LIST command. This buffer is then used to execute an egghunter which locates the shellcode in memory and executes it. The exploit also includes a bindshell payload that listens on port 4444.
This vulnerability allows for arbitrary code execution and crashing of Internet Explorer. It can be triggered by visiting a malicious website. The exploit attempts to inject JavaScript code into the browser, causing it to crash. The vulnerability is unstable and may not always successfully execute the exploit.