Observer is an autodiscovering PHP/MySQL/SNMP/CDP based network management system focused primarily on Cisco and Linux/BSD networks. A vulnerability exists in the Observer <= 0.3.2.1 version due to improper input validation in the whois.php and netcmd.php scripts. This allows an attacker to execute arbitrary commands on the vulnerable system.
A vulnerability exists in Barcode Generator 1D, which can be exploited by malicious people to disclose sensitive information. The vulnerability is caused due to the 'code' parameter in 'image.php' not properly sanitized before being used to include files. This can be exploited to include arbitrary files from local resources via directory traversal attacks.
Cookie is base64 based and the ascii format used is: user:23ed4e45887ad4311ff654bd4aab6540:user:0 user:md5 pass:user:0 Programmer forgot to check the pass and only use the nick to autenticate the user. You can create a fake cookie likes this: sysop:000000000000000000000000000000:sysop:0 In base64: c3lzb3A6MDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwOnN5c29wOjA Exploit: javascript:document.cookie = "fpusuario=c3lzb3A6MDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwOnN5c29wOjA"
webcp 0.5.7 is vulnerable to a remote file disclosure vulnerability due to insufficient validation of user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This will allow the attacker to view the contents of arbitrary files on the server.
A remote SQL injection vulnerability exists in Jadu CMS for Government. An attacker can exploit this vulnerability to gain access to sensitive information such as usernames and passwords. The vulnerability is due to insufficient sanitization of user-supplied input in the 'id' parameter of the 'recruit_details.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. Successful exploitation of this vulnerability can result in unauthorized access to sensitive information.
This POC has been designed with minimum object usage. This can be made more critical when combined with number of objects. For Example: using alert function will make it more exhaustive.
A vulnerability exists in PHPcounter version 1.3.2 which allows an attacker to include arbitrary files from the local system. This is due to a lack of sanitization of user-supplied input to the 'l' parameter in the 'defs.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal sequences and a URL-encoded NULL byte.
A vulnerability in Mailwatch <= 1.0.4 allows an attacker to include arbitrary files from the local system via the 'doc' parameter in the 'docs.php' script.
A Local File Inclusion vulnerability exists in emergecolab 1.0 due to improper validation of user-supplied input. An attacker can exploit this vulnerability to include arbitrary files from the web server, which may lead to the disclosure of sensitive information or the execution of arbitrary code.
AJ Auction Pro Platinum Skin #2 is prone to a remote SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data. This issue affects versions prior to AJ Auction Pro Platinum Skin #2 2.0.2.