Merlix Educate Server is prone to multiple remote vulnerabilities, including a bypass and a directory traversal vulnerability. An attacker can exploit these issues to bypass security restrictions and gain access to sensitive files, potentially leading to further attacks.
A vulnerability exists in Multiple Membership Script V 2.5 which allows an attacker to inject malicious SQL commands and gain access to sensitive information from the database. An attacker can exploit this issue by supplying a specially crafted parameter value to the vulnerable application. This can be exploited to gain access to the database and execute arbitrary SQL commands.
BNCwi is a Open-Source webinterface for psyBNC. With it you easily can manage your Bouncer via a graphical interface. A vulnerability exists in the index.php file of the BNCwi script, which allows an attacker to include arbitrary local files on the server. This is due to a lack of input validation on the 'newlanguage' parameter, which is passed to the 'include()' function. An attacker can exploit this vulnerability by sending a specially crafted HTTP POST request with a malicious 'newlanguage' parameter.
An open source list manager for tracking action items according to the principles of Getting Things Done (GTD) is vulnerable to LFI/RCE. The vulnerability exists in the file rpc.php (lines: 15-20) where the user input is not properly sanitized. This allows an attacker to inject malicious code and execute it on the server.
A SQL injection vulnerability exists in the Joomla Component mydyngallery, which allows an attacker to execute arbitrary SQL commands via the 'directory' parameter in a index.php?option=com_mydyngallery request. The attacker can use the 'union' keyword to append the results of a second query to the results of the first query, and can use the 'concat' keyword to concatenate strings together.
My Simple Forum 3.0 is vulnerable to a local file inclusion vulnerability due to a lack of sanitization of the 'action' parameter in the index.php file. An attacker can exploit this vulnerability by sending a crafted HTTP request with a malicious 'action' parameter containing directory traversal sequences (e.g. '../../../../../../../etc/passwd%00') to the vulnerable server. This will allow the attacker to read arbitrary files from the server.
lcxBBportal version 0.1 Alpha 2 is vulnerable to Remote File Inclusion. The vulnerable files are portal/includes/portal_block.php and includes/acp/acp_lcxbbportal.php. An attacker can exploit this vulnerability by sending a malicious URL to the application. The malicious URL contains the path to the malicious file which will be included in the vulnerable file.
An attacker can access the MS Access database file (News.mdb) by using the directory traversal vulnerability. The vulnerable URL is SITE.COM/Database/News.mdb
A vulnerability in ASP Template Creature allows an attacker to perform a directory traversal attack and a SQL injection attack. The attacker can access the templatemonster.mdb file and can also access the tb_adminUser table to gain access to the username and password of the administrator.
A vulnerability exists in Wbstreet v.1.0, which allows a remote attacker to inject arbitrary SQL commands via the 'id' parameter in the 'show.php' script. An attacker can exploit this vulnerability to gain access to the database, disclose sensitive information, modify data, and execute system level commands.