This exploit allows an attacker to perform a remote SQL injection on PHPBB Minerva Mod version 2.0.21 build 238a through the 'forum.php' file. The vulnerability allows the attacker to extract the user password from the 'minerva_users' table by manipulating the 'user_id' parameter.
This exploit allows an attacker to include local files on the server by manipulating the 'name' parameter in the 'bbcode_ref.php' script of Modulo Splatt Forum v4.0 RC1. The vulnerable code can be found on line 17 and 19 of the script. By including certain files, an attacker can potentially view sensitive information such as log files.
This exploit creates a vulnerable image.xml file that can cause a crash in i.Mage software. The vulnerability is caused by an access violation when reading a specific memory address. The exploit author has provided a proof of concept code that fills the image.xml file with a large number of 'A' characters, causing the crash. It is recommended to copy the image.xml file to the installation directory of i.Mage software and start the application to trigger the crash.
i.Hex is a small and free graphical Hex Editor for Windows. The vulnerability allows an attacker to create a malicious iHex.xml file that can crash the i.Hex software.
This exploit takes advantage of a buffer overflow vulnerability in i-FTP v2.20, allowing an attacker to execute arbitrary code. The exploit uses a return address overwrite technique to redirect program execution flow to the attacker's shellcode. The shellcode payload used in this exploit spawns the Windows calculator. The exploit has been tested on various Windows platforms, including Win7 32bit, Win8.1 64bit, and Win XPsp3.
This vulnerability allows remote file inclusion.
An attacker can exploit this issue by enticing a legitimate user to use the vulnerable application to open a file from a network share location that contains a specially crafted Dynamic Link Library (DLL) file.
GIMP is prone to multiple remote stack-based buffer-overflow vulnerabilities because it fails to perform adequate checks on user-supplied input. Successfully exploiting these issues may allow remote attackers to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.
This is a local root exploit for Linux systems. It allows an attacker to gain root privileges on the target system.
A security bug has been discovered in MetaForum 0.513 Beta. This bug can be used by an attacker to upload a malicious php file on the server. During the upload, the MIME type of the file is the only verified parameter. The extension isn't. This enables an attacker to fake the MIME type of a php file so that it is considered as an image.