The PcP-Book 3.0 portal is vulnerable to remote file inclusion. An attacker can exploit this vulnerability by injecting a malicious file in the 'lang' parameter of the affected URLs. This allows the attacker to execute arbitrary code on the target system.
This exploit modifies the GdiTable of the current process to change an entry of the win32k's SSDT to 0x2. It allows an attacker to escalate their privileges. The exploit has been tested on Windows XP SP2 French with the latest updates.
This exploit allows an attacker to include local files on the server using the ScarNews sn_admin_dir parameter. The exploit takes advantage of a vulnerability in the ScarNews v1.2.1 script.
The Machine component for Joomla! is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Input passed via the 'tcp_box_path' HTTP POST parameter passed to '/wp-admin/admin.php?page=checkout_editor_settings' URL is not properly verified before being used in PHP 'include()' function, and can be abused to include arbitrary local files via directory traversal sequences. An attacker with administrator privileges can exploit this vulnerability to execute arbitrary PHP code and disclose sensitive data. Additionally, the plugin is vulnerable to Cross-Site Scripting attacks via CSRF vectors.
The witshare 0.9 software is vulnerable to Local File Include. An attacker can exploit this vulnerability by providing a malicious file name in the 'menu' parameter of the index.php file. This can lead to arbitrary file inclusion and potentially execute arbitrary code.
F*EX is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data. Exploiting these issues could allow an attacker to execute arbitrary script on the affected server and steal cookie-based authentication credentials. Other attacks are also possible.
This vulnerability allows an attacker to include remote files in the MyBlog PHP and MySQL Blog/CMS software. The exploit can be triggered by manipulating the 'scoreid' parameter in the 'games.php' script.
Another .Ani bug that freezes Explorer if you open a folder that contains a crafted file.
Exploit gives a reverse shell to lhost:lport