The Elite Forum application fails to properly sanitize user-supplied input before using it in dynamically generated content. This allows an attacker to inject HTML and script code into the affected website, potentially leading to the theft of authentication credentials and control over the site's rendering.
The vCard PRO application is prone to an SQL injection vulnerability. This vulnerability occurs when user-supplied input is not properly sanitized before being used in an SQL query. An attacker can exploit this vulnerability by injecting malicious SQL code into the 'addr_id' parameter of the 'edit' action in the 'addrbook.php' script. Successful exploitation of this vulnerability could lead to a compromise of the application, disclosure or modification of data, or allow the attacker to exploit other vulnerabilities in the underlying database implementation.
The applications are prone to SQL injection attacks, information disclosure, and multiple cross-site scripting attacks. An attacker can exploit these vulnerabilities to retrieve sensitive and privileged information, gain access to the application as an administrative user, and perform cross-site scripting attacks to retrieve cookie-based authentication credentials from victim users.
The applications are prone to SQL injection attacks, information disclosure, and multiple cross-site scripting attacks. An attacker can exploit these vulnerabilities to retrieve sensitive and privileged information, gain access to the application as an administrative user, and perform cross-site scripting attacks to retrieve cookie-based authentication credentials from victim users; other attacks are also possible.
The vulnerability allows attackers to overwrite the GLOBAL variable via HTTP POST requests. By exploiting this issue, remote attackers may be able to overwrite the GLOBAL variable and further exploit latent vulnerabilities in PHP scripts.
OaBoard is prone to multiple SQL injection vulnerabilities. These issues are due to a lack of proper sanitization of user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
The Snitz Forum is vulnerable to a cross-site scripting (XSS) vulnerability. This vulnerability is caused by a lack of proper input sanitization in the application. An attacker can exploit this vulnerability by injecting arbitrary script code into the affected site, which can lead to the execution of malicious code in the browser of unsuspecting users. This can result in the theft of authentication credentials and other attacks.
Access to sensitive files containing authentication credentials is not restricted, allowing remote attackers to obtain a user's password hash and authenticate to the service using a cookie.
MG2 is affected by an authentication bypass vulnerability. This issue can allow remote attackers to gain access to password protected image galleries.
ASP Fast Forum is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.