DuhokForum version 1.1 is vulnerable to a SQL injection attack. An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable index.php page. This can be done by sending a specially crafted URL to the vulnerable page, such as http:localhost/duhokfrm/index.php?modd=[Inj3ct Here ;)]. This will allow the attacker to execute arbitrary SQL commands on the underlying database.
cPanel versions below and excluding 11.25, are vulnerable to CSRF which leads to uploading a PHP script of the attackers liking. If you have turned off security tokens and referrer security check, no matter what version you are using, you are vulnerable as well.
This module exploits a stack buffer overflow in Musick Maker 16 When opening a malicious .MMM file in Music Maker, a stack buffer occurs, resulting in arbitrary code execution via SEH. This exploit bypasses DEP & ASLR and works on XP, Vista & Windows 7. LTKRN14n.dll and LTDIS14n.dll used for ROP.
A vulnerability in Magneto ICMP ActiveX v4.0.0.20 allows remote attackers to execute arbitrary code via a crafted web page. The vulnerability exists in the ICMPSendEchoRequest function of SKIcmp.ocx, which can be exploited to control the edx register. An attacker can leverage this vulnerability to execute arbitrary code in the context of the user running the affected application.
HB ECOMMERCE is vulnerable to SQL Injection. An attacker can exploit this vulnerability to gain access to the customers table and dump passwords in plaintext. The vulnerable URL is /templates1/view_product.php?product=, where the attacker can inject malicious SQL code. An example of a malicious URL is http://localhost/templates1/view_product.php?product=94746%20AND%20%28SEL=ECT%20716%20FROM%28SELECT%20COUNT%28%2A%29%2CCONCAT%28CHAR%2858%2C122%2C99%=2C109%2C58%29%2C%28SELECT%20MID%28%28IFNULL%28CAST%28email%20AS%20CHAR%29%2CCHAR%2832%29%29%29%2C1%2C50%29%20FROM%20%60web34-hbecommerc%60.customers%20LIMIT%205%2C1%29%2CCHAR%2858%2C109%2C103%2C100%2C58%29%2CFLOOR%28RAND%280%29%2A2%29x%20FROM%20INFORMATION_SCHEMA.CHARACTER_SETS%20GROUP%20BY%20x%2 9a%29%20
A sql injection vulnerability in Clipbucket 2.4 RC2 645 can be exploited to extract arbitrary data. In some environments it may be possible to create a PHP shell.
This module exploits an arbitrary command execution vulnerability in the AWStats Totals PHP script. AWStats Totals version v1.0 - v1.14 are vulnerable.
The vulnerability exists due to failure in the "cal_search.php" script to properly sanitize user-supplied input in "search" variable. Attacker can alter queries to the application SQL database, execute arbitrary queries to the database, compromise the application, access or modify sensitive data, or exploit various vulnerabilities in the underlying SQL database.
A local file inclusion vulnerability in i-doIT 0.9.9-4 can be exploited to include arbitrary files. The proof of concept involves sending a crafted URL to the vulnerable application.
A sql injection vulnerability in Tickets 2.13 can be exploited to extract arbitrary data. In some environments it may be possible to create a PHP shell.