OpenX is vulnerable to a remote file inclusion vulnerability due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability by appending a null byte to the end of a string and using directory traversal in the GET parameter MAX_type, like so: /www/delivery/fc.php?MAX_type=../../../../../../../../../../../../../../../etc/passwd%00, which will allow the attacker to view the /etc/passwd file.
A heap overflow vulnerability exists in NCTVideoStudio ActiveX DLLs Version 1.6 when a maliciously crafted argument is passed to the NCTVideoStudio() method. This can be exploited to execute arbitrary code by a remote attacker.
A vulnerability in Joomla Component Flash Magazine Deluxe allows an attacker to inject malicious SQL commands into the application. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'mag_id' parameter of the 'index.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in the context of the application. This can allow the attacker to compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, and compromise the underlying system.
This exploit allows an attacker to gain access to sensitive files on the server by exploiting a vulnerability in SiteXS <= 0.1.1. The vulnerability is caused due to the improper sanitization of user-supplied input to the 'type' parameter in 'post.php'. This can be exploited to include arbitrary files from local resources via directory traversal attacks.
Groone's GLink Organizer is vulnerable to a SQL injection attack. By sending a specially crafted HTTP request to the index.php page, an attacker can execute arbitrary SQL commands on the underlying database.
Wazzum Dating Software is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to manipulate SQL queries and gain access to unauthorized information. This issue affects the 'userid' parameter of the 'profile_view.php' script.
This exploit is used to gain access to the admin panel of the PHP-CMS 1 application. It uses a blind SQL injection vulnerability to gain access to the admin panel. The exploit uses a function called query() to construct a malicious query and then uses the fsockopen() function to send the malicious query to the server. The exploit then uses the time() function to measure the response time of the server and if the response time is greater than 4 seconds, it means that the malicious query was successful and the exploit was successful.
This exploit allows a remote attacker to execute arbitrary code on a vulnerable system running WinFTP 2.3.0. The attacker must have valid credentials to authenticate to the FTP server. The exploit sends a specially crafted FTP command to the server, which allows the attacker to execute arbitrary code on the vulnerable system.
SHOP-INET V.4 is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to manipulate SQL queries and gain access to unauthorized information.
A SQL injection vulnerability exists in Script Toko Online Vs.5.01, which allows an attacker to execute arbitrary SQL commands via the 'cat_id' parameter in the 'shop_display_products.php' script.