The Neturf eCommerce Shopping Cart is vulnerable to a cross-site scripting (XSS) attack due to inadequate input sanitization. An attacker can exploit this vulnerability by injecting malicious script code into the 'SearchFor' parameter of the 'search.php' page. When an unsuspecting user visits the affected site and performs a search, the injected script code will execute in their browser, allowing the attacker to potentially steal authentication credentials and launch further attacks.
The Samba software is prone to an unspecified remote code-execution vulnerability. An attacker can exploit this issue to execute arbitrary code with root privileges. Failed exploit attempts will cause a denial-of-service condition.
The vulnerability allows an attacker to disclose files on the server by exploiting the 'navigator_ok.php' script in Pagode 0.5.8. By providing a specially crafted 'asolute' parameter in the URL, an attacker can read arbitrary files on the server, such as the '/etc/passwd' file.
This is a buffer overflow exploit for Winamp Media Player. The exploit is in the form of an executable file (winamp.exe) and a Perl script (winamp.pl). The exploit takes advantage of a buffer overflow vulnerability in Winamp to cause a denial-of-service (DOS) attack. The exploit creates a malicious AVI file (Dr.Trojan.avi) that triggers the buffer overflow when opened in Winamp. The exploit was discovered by the DeltahackingTEAM and the bug was found and exploited by Farzad.Sharifi (Dr.Trojan). The risk level of this vulnerability is high.
This exploit allows an attacker to execute arbitrary commands on a vulnerable Magento CE version < 1.9.0.1 post-authentication. The exploit works by leveraging a vulnerability in the Zend_Log class to pivot into the call_user_exec function and execute a specified command. The payload is constructed as an object of the Zend_Log class with a malicious YAML encoder that allows the execution of the command passed as an argument. The exploit requires authentication and the exact installation date from the local.xml file. It has been tested on Ubuntu 15.
There is a remote file inclusion vulnerability in Joomla 1.5.0 Beta. The vulnerability exists in the file /libraries/pcl/pcltar.php, specifically on line 74. An attacker can exploit this vulnerability by including a remote file using the 'g_pcltar_lib_dir' parameter. The proof of concept (POC) URL provided demonstrates the vulnerability.
This exploit allows an attacker to remotely overflow the USERID parameter in Easy File Management Web Server v5.6, leading to arbitrary code execution. The vulnerability was discovered by Tracy Turben and the exploit code is based on the work of superkojiman. The exploit takes advantage of a buffer overflow in the USERID parameter to execute a crafted payload. It uses a pivot technique to redirect execution flow to the crafted payload and then executes a stack-based shellcode to spawn a calculator (calc.exe).
This is a remote SQL injection exploit for MyBulletinBoard version 1.2.5. The exploit allows an attacker to execute arbitrary SQL queries on the target system.
This is an exploit code written in Perl by Tal zeltzer.
By opening a specially crafted file, SEH can be overwritten which makes code execution possible. This sploit runs calc.exe or binds to port 4444.