The function '_write_log' in the touchscreen drivers allows an attacker to write to files from kernel code. This vulnerability can be triggered by an attacker. Similar vulnerable functions exist as 'write_file' in multiple files.
This is a SQL Injection exploit for phpEventCalendar version 0.2.3. It allows an attacker to retrieve the username and password from the database by injecting malicious SQL statements.
SQL injection in CatagoryID of process.php, able to retrieve admin/pass through error message.
The browser cookie is sql injectable, allowing admin access without knowing the password.
The sphpell 1.01 script is vulnerable to remote file inclusion. The vulnerability exists in the spellcheckpageinc.php, spellchecktext.php, spellcheckwindow.php, and spellcheckwindowframeset.php files. An attacker can include arbitrary remote files by manipulating the SpellIncPath parameter in the URL.
The SonicDICOM PACS software version 2.3.2 and 2.3.1 allows users to perform actions via HTTP requests without validity checks. This can be exploited to perform actions with administrative privileges if a logged-in user visits a malicious website.
The XCMS CMS version 1.1 is vulnerable to a remote directory listing and local file inclusion vulnerability. The vulnerability exists in the 'Galerie.php' module, where the 'Lang' and 'Ent' parameters are not properly validated before being used in include and opendir functions, respectively. An attacker can exploit this vulnerability to read arbitrary files on the server and potentially execute malicious code.
Remote SQL injection in view_event.php id, able to pull admin username/md5hash.
This exploit allows an attacker to remotely steal the /etc/shadow file from a vulnerable MusicDaemon version 0.0.3. The vulnerability does not require shellcode or return addresses and works by exploiting the lack of authentication and privilege checks in the application. By sending specific commands to the MusicDaemon, an attacker can retrieve sensitive system files such as /etc/shadow.
Cross-Site Request Forgery (CSRF) vulnerability in the DIR-600M wireless router enables an attacker to perform an unwanted action on a wireless router for which the user/admin is currently authenticated. An attacker who lures a DIR-600M authenticated user to browse a malicious website can exploit cross site request forgery (CSRF) to add new admin, change wifi password and to change other network settings.