The BlackBerry Device Software is prone to a cross-domain information-disclosure vulnerability because the application's web browser fails to properly enforce the same-origin policy. An attacker can exploit this issue to access local files or content from a browser window in another domain or security zone. This may allow the attacker to obtain sensitive information or may aid in further attacks.
This is a proof of concept code from the Hardened-PHP Project that demonstrates a double free vulnerability in PHP 5. It allows an attacker to execute arbitrary code by exploiting a memory corruption issue in the session ID handling. The exploit includes a Linux x86 bindshell on port 4444 from Metasploit.
This exploit allows an attacker to gain root access on a vulnerable x86/linux system running wu_ftpd. The exploit utilizes a shellcode to execute arbitrary commands on the target system.
An attacker can exploit an SQL-injection vulnerability in ITS SCADA to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. The attacker can use the provided example payload to retrieve a password from the 'Users' table.
SurgeMail is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
An attacker can exploit this issue to run arbitrary SQL statements with 'SUPER' privileges on the slave database system, allowing them to compromise the affected database system.
The Intellicom Netbiter webSCADA products are prone to multiple remote security vulnerabilities, including a directory-traversal vulnerability, an information-disclosure vulnerability, and an arbitrary-file-upload vulnerability. An attacker can exploit these issues to upload and execute arbitrary script code on an affected computer with the privileges of the webserver process, view arbitrary local files, or obtain sensitive data that can aid in further attacks.
Pluck is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.
This is a proof of concept code from the Hardened-PHP Project that demonstrates a double free exploit in the PHP 5 session_regenerate_id() function. The exploit allows an attacker to execute arbitrary code on a vulnerable system. The exploit includes a Linux x86 bindshell on port 4444 from Metasploit.
The GetSimple CMS is prone to a cross-site scripting vulnerability due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability to execute arbitrary script code in the browser of a victim user, potentially leading to the theft of authentication credentials and other malicious activities.