The SiAdmin 1.1 application is vulnerable to SQL injection. An attacker can exploit this vulnerability by sending a specially crafted HTTP GET request to the target server. This allows the attacker to execute arbitrary SQL queries and potentially gain unauthorized access to the database.
The Zint Barcode Generator version 2.6 is vulnerable to a denial of service (DoS) attack. By sending a specially crafted request, an attacker can cause the application to crash, resulting in a denial of service condition.
The vulnerability allows an attacker to redirect users to malicious websites or forward them to another page without proper validation.
Vulnerability in (File.php?id=) allows remote attackers to execute arbitrary SQL commands via the id parameter, which can lead to unauthorized access and disclosure of sensitive information.
Loadbalancer.org Enterprise VA MAX - Remote Code Execution via Unauthenticated Stored XSS. Two instances of Stored XSS were found - exploit uses both. It is possible to inject custom JavaScript code during authentication to /lbadmin/. Application takes input from Basic Auth (username) and stores it without encoding/sanitization/filtering in Apache Error Log. This instance only forks for HTTPS. It is also possible to inject custom JavaScript code by accessing URL like /?<XSS>. Such JavaScript is stored in Apache User Log. This way attacker can store JavaScript code that can for example execute system command as root. This is actually what this exploit does - spawns reverse shell. When application user browses Apache Error Log or Apache User Log custom JavaScript code gets automatically executed.
The CI User Login and Management 1.0 software allows an attacker to upload arbitrary files to the server. This can lead to remote code execution and other unauthorized activities.
The GoSamba 1.0.1 software is vulnerable to multiple remote file inclusion vulnerabilities. Attackers can exploit these vulnerabilities by including arbitrary remote files via the 'include_path' parameter in various PHP files.
The Acropolis SFTP server doesn't check if the client has completed the authentication step before allowing the client to open channels. This allows an attacker to list the root directory without authenticating.
This module exploits a stack based buffer overflow in Any Sound Recorder 2.93, when with the name "hack.txt". Copy the content of the "hack.txt", Start Any Sound Recorder 2.93 click "Enter Key Code" Paste the content into field "User Name" click "Register"
This exploit allows an attacker to execute arbitrary code on a target system by sending a specially crafted buffer to the IBM Tivoli Storage Manager Express CAD Service. The buffer overflow vulnerability exists in version 5.3 of the software. The exploit code provided in the script connects to a target host and sends the malicious buffer. If successful, it opens a bindshell on port 4444 for the attacker to gain remote access to the system. The script was tested on a Windows 2003 server SP0.