This exploit is for the Wserve HTTP Server 4.6 version which is vulnerable to a buffer overflow attack. The attacker sends a specially crafted HTTP request with a long directory name, causing a buffer overrun. This results in a denial of service as the program's internal state gets corrupted and it cannot continue execution safely.
The 'getIpAddr' function in the 'classUserdb.php' file of Traidnt Up v3.0 prioritizes untrusted user input entry (HTTP_CLIENT_IP & HTTP_X_FORWARDED_FOR) over the trusted one (REMOTE_ADDR) and does not perform sanitization.
This vulnerability allows an attacker to remotely disclose files on the target system. It works independently from PHP version but depends on PHP option register_globals (= on) or PHP versions (< 4.3.0). The exploit can be triggered by accessing the picture.php file with specific parameters.
This exploit allows an attacker to perform a blind SQL injection attack on the XOOPS Module Jobs <= 2.4. By manipulating the 'cid' parameter in the index.php file, an attacker can retrieve sensitive information from the database, including the usernames and passwords of the admin users.
This exploit allows an attacker to perform two different attacks on a vulnerable version of phpMyNewsletter. Attack N°1 allows an attacker to inject a shell into the config file if mq=off. Attack N°2 allows an attacker to send previously created newsletters and spam.
This exploit allows an attacker to perform a blind SQL injection attack in XOOPS Module WF-Links version 1.03 or below. The vulnerability allows the attacker to retrieve sensitive information from the database, such as usernames and passwords of the XOOPS users.
Internet Connect application in Apple OSX Panther allows any file on the file system to be altered by creating a symlink file pointing to the file to be altered.
The vulnerability allows an attacker to include a remote file in the application, which can lead to remote code execution. The vulnerability exists in the include.php, /dbcommon/include.php, and /exception/include.php files.
There is a security bug in BOA v0.94.8.2 that allows a malicious user to access files outside the document root of the web server as the user the server runs as.
Dolibarr is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.