This code exploits a well-known local-root bug in sendmail 8.11.x. It gives instant root shell with +s sendmail 8.11.x, x < 6.
The exploit overwrites the system.ini file, potentially causing damage to the system. It is recommended to make a copy of the file before running the exploit.
Checkbox is a survey application deployed by a number of highly profiled companies and government entities. The vulnerabilities include a directory traversal vulnerability, direct object reference vulnerability, and an open redirection vulnerability. The directory traversal vulnerability allows an attacker to download sensitive files such as the web.config file. The direct object reference vulnerability allows access to attachments without login. The open redirection vulnerability allows an attacker to redirect users to a malicious website.
A Bozon vulnerability allows unauthenticated attackers to add arbitrary users and inject system commands to the "auto_restrict_users.php" file of the Bozon web interface. This issue results in arbitrary code execution on the affected host, attackers system commands will get written and stored to the PHP file "auto_restrict_users.php" under the private/ directory of the Bozon application, making them persist. Remote attackers will get the command responses from functions like phpinfo() as soon as the HTTP request has completed. In addition when an admin or user logs in or the webpage gets reloaded the attackers commands are then executed as they are stored. If a Command is not injected to the "auto_restrict_users.php" file, unauthenticated attackers can opt to add user accounts at will.
This vulnerability allows an attacker to include local files on the server by manipulating the 'doc_id' parameter in the URL. By replacing the first hex value before the comma, an attacker can include any file on the server.
This module exploits a stack-based buffer overflow vulnerability in the web interface of DiskBoss Enterprise v7.5.12 and v7.4.28, caused by improper bounds checking of the request path in HTTP GET requests sent to the built-in web server. This module has been tested successfully on Windows XP SP3 and Windows 7 SP1.
The Business Networking Script v8.11 is vulnerable to SQL Injection and Persistent Cross Site Scripting attacks. The SQL Injection vulnerability can be exploited through the 'gid' parameter in the 'show_group_members.php' page. The Persistent XSS vulnerability exists in the 'home.php' page with the 'first_name' parameter. An attacker can inject malicious code to execute arbitrary SQL queries or perform XSS attacks.
The pagetool-1.07 version is vulnerable to a remote SQL injection. This can be exploited by an attacker by sending a specially crafted request to the index.php file with a malicious payload in the 'name' parameter. This allows the attacker to retrieve sensitive information from the database.
This exploit allows an attacker to execute arbitrary code on a target system running DreamLog v0.5. The vulnerability exists in the 'File' parameter of the script, which can be exploited to upload a malicious file. The exploit takes advantage of a lack of input validation and file upload restrictions.
The Sitedepth CMS version 3.44 has a Local File Include vulnerability in the ShowImage.php file. This vulnerability allows an attacker to include arbitrary files from the server, potentially leading to remote code execution.