The Rezervi Generic 0.9 script is vulnerable to remote file inclusion. An attacker can exploit this vulnerability by including a malicious file via the 'root' parameter in various files within the templates and belegungsplan directories. This allows the attacker to execute arbitrary code on the target system.
This exploit allows an attacker to execute arbitrary code remotely in AimStats v3.2. The vulnerability can be exploited by sending specially crafted requests to the vulnerable server. This can lead to unauthorized access and control over the affected system.
The Mozzers SubSystem v1.0 Final has a remote code execution vulnerability that allows attackers to execute arbitrary code on the affected system. This vulnerability can be exploited by sending a specially crafted request to the vulnerable application. Successful exploitation of this vulnerability can result in unauthorized access, data manipulation, or system compromise.
This vulnerability allows an attacker to include remote files and execute arbitrary code on the target system. It can be exploited by using a specially crafted URL to include a malicious file.
The exploit description is not provided in the given text.
The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.
This is a Proof of Concept (PoC) exploit for the Full Player 8.2.1 software. It demonstrates a memory corruption vulnerability in the software.
Aradown is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
This exploit targets the Joomla Template Be2004-2 (index.php) script. It allows an attacker to remotely include files by manipulating the 'mosConfig_absolute_path' parameter in the URL.
The PBBoard web-based messaging board application allows attackers to gain unauthorized access to user accounts or bypass intended security restrictions. This can be achieved by exploiting a vulnerability in the application's login system, specifically the way cookies are handled for login confirmation. By manipulating the cookies, an attacker can bypass the login rules and gain administrative privileges. This vulnerability was discovered in PBBoard versions prior to 2.1.4.