Input passed to the 'cat_id' parameter in backlinkspider's page is not properly verified before being used to sql query. This can be exploited to execute sql query through the browser. Successful exploitation requires that 'magic_quotes' is enabled.
Input passed to the "file" parameter in htmlcode.php is not properly verified befoer being used to include files. This can be exploited to include arbitrary files from local or external resources.
Input passed to the "file" parameter in htmlcode.php is not properly verified before being used to include files. This can be exploited to include arbitrary files fron remote hosts.
Online Rental Property Script version 4.5 and prior are prone to a blind SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue allows an attacker to manipulate SQL queries by injecting arbitrary data. This can be exploited to manipulate or disclose arbitrary data in the back-end database.
Input passed to the 'id' parameter is not properly verified before being used to sql query. This can be exploited thru the browser and get the username and hash md5 password from users. Successful exploitation requires that 'magic_quotes' is off.
Scout Portal Toolkit version 1.4.0 and prior are vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability to gain access to the database and extract sensitive information such as usernames and passwords. The exploit is triggered by sending a specially crafted HTTP request to the vulnerable application.
cpLinks v1.03 is vulnerable to bypass, SQL and XSS injection. An attacker can bypass the authentication by entering ' or 1=1 /* in the username field and can inject malicious SQL and XSS payloads in the search_category and search_text parameters of the search.php page.
The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'site' parameter to '/news/example.php'. This can be exploited to execute arbitrary PHP code by including a remote file with a specially crafted URL.
SQL Injection vulnerability exists in phpDirectorySource 1.1 which allows an attacker to bypass administrator login and extract sensitive information from the database. The vulnerability is due to improper sanitization of user-supplied input in the 'lid' parameter of the 'show.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable script with malicious SQL statements in the 'lid' parameter. This will allow the attacker to bypass administrator login and extract sensitive information from the database.
This exploit is a remote heap overflow vulnerability in HLDS WebMod 0.48. It was tested on HLDS Launcher 4.1.1.1, WebMod 0.48, and Windows XP SP2 Hebrew. The exploit is triggered by sending a specially crafted packet to the server. The packet contains a shellcode that is executed when the exploit is successful.