This is a proof-of-concept exploit for a remote buffer overflow vulnerability in XAMPP for Windows version 1.6.0a. The vulnerability exists in the adodb.php file, specifically in the mssql_connect() function. By exploiting this vulnerability, an attacker can overwrite the structured exception handler (SEH) and gain control over the affected system. The exploit targets Windows 2000 SP3 version. This exploit was developed by retrogod and can be found on their website at http://retrogod.altervista.org.
Multiple SQL injection vulnerabilities in Genixcms register.php
This vulnerability allows an attacker to include remote files by manipulating the 'absolute_path' parameter in the 'com_articles.php' and 'html/com_articles.php' files. By providing a malicious URL as the 'absolute_path' parameter, an attacker can execute arbitrary code on the server.
LS simple guestbook fails to sanitize user input that it writes to the posts.txt file when the user leaves a message, this file is then included causing any php code within it to be run.
The vulnerability allows remote attackers to include arbitrary files via a vulnerable parameter in mod_as_category.php.
The Pixaria Gallery 1.x version is vulnerable to remote file inclusion. The vulnerability exists in the '/resources/includes/class.Smarty.php' file, where it loads the main Smarty class. An attacker can exploit this vulnerability by passing malicious code in the 'cfg[sys][base_path]' parameter, allowing them to include arbitrary files from a remote server.
A session vulnerability has been discovered in the official ZTE Corporation ZXV10 W300 v3.1.0c_DR0 modem hardware. The security vulnerability allows remote attackers to block/shutedown or delete network settings and components. Attackers can request via GET method the /Forms/home_lan_1 path and the modem will delete all the LAN configurations automatically.
The Garennes version 0.6.1 is vulnerable to Remote File Include. This vulnerability allows an attacker to include remote files by exploiting the 'repertoire_config' parameter in various PHP files. The attacker can specify a malicious file as the value of the 'repertoire_config' parameter, leading to arbitrary code execution.
This exploit allows an attacker to perform SQL Injection on Frogss CMS version 0.7 or below. The attacker can execute arbitrary SQL queries and potentially gain unauthorized access to the database.
Attackers can steal cookie-based authentication credentials, execute arbitrary script code in the browser, and retrieve arbitrary files from the affected system. This can lead to the disclosure of sensitive information and other possible attacks.