This vulnerability allows for local file inclusion and cross-site scripting (XSS) attacks. The first vulnerability can be exploited by accessing the backend/admin-functions.php file with a malicious ss_uri parameter. The second vulnerability can be exploited by accessing the pjirc/css.php or browse.php files with a malicious color or cat parameter respectively. These vulnerabilities can be used to execute arbitrary code or steal sensitive information from the affected system.
This exploit allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Yahoo Messenger V5.5 request.
The WolfSight CMS 3.2 is vulnerable to SQL Injection. An attacker can exploit this vulnerability to execute arbitrary SQL commands and gain unauthorized access to the database.
This exploit allows an attacker to execute arbitrary code remotely on a Gitea 1.4.0 server without authentication. The attacker can create a fake OID for the app.ini file and trigger the execution of arbitrary commands.
This module exploits an unauthenticated remote command execution vulnerability in the discoveryd service exposed by HID VertX and Edge door controllers. The vulnerability allows an attacker to execute arbitrary commands on the target system. This module was tested successfully on a HID Edge model EH400 with firmware version 2.3.1.603 (Build 04/23/2012).
This module exploits a hardcoded service token or default credentials in HPE VAN SDN Controller <= 2.7.18.0503 to execute a payload as root. A root command injection was discovered in the uninstall action's name parameter, obviating the need to use sudo for privilege escalation. If the service token option TOKEN is blank, USERNAME and PASSWORD will be used for authentication. An additional login request will be sent.
The MOSMediaLite451 script is vulnerable to remote file inclusion. The vulnerability allows an attacker to include and execute arbitrary files from a remote server by manipulating the 'mosConfig_absolute_path' parameter in various PHP files.
A malicious .wav file cause this vulnerability.
The wzdftpd 0.8.0 (USER) Remote Denial of Service vulnerability allows remote attackers to cause a denial of service (DoS) by sending a specially crafted USER command to the vulnerable server. This can result in an access violation, causing the server to crash.
This module exploits a stack buffer overflow in Boxoft WAV to MP3 Converter versions 1.0 and 1.1. By constructing a specially crafted WAV file and attempting to convert it to an MP3 file in the application, a buffer is overwritten, which allows for running shellcode.