This vulnerability allows an attacker to inject malicious SQL commands into a vulnerable web application. The attacker can use the SQL injection vulnerability to gain access to sensitive data stored in the database, such as usernames and passwords. The exploit involves using a specially crafted SQL query to bypass authentication and gain access to the database. The attacker can then use the data to gain access to other parts of the system or to launch further attacks.
A Cross-Site Scripting (XSS) vulnerability exists in PHP Uploader Downloader Version 2.0, which allows remote attackers to inject arbitrary web script or HTML via the '>' parameter. An attacker can exploit this vulnerability to execute arbitrary HTML and script code in a user's browser session in the context of the affected site.
The vulnerability exists due to insufficient sanitization of user-supplied input in the 'module' parameter of '/modules/Suggest/index.php', the 'modul' parameter of '/Includes/blocks/block_module.php' and the 'blok[type]' parameter of '/nuked.php' scripts. A remote attacker can execute arbitrary PHP code on the vulnerable system by sending a specially crafted request.
The vulnerability exists due to insufficient sanitization of user-supplied input in 'news.mainnews.php' and 'filter.php' scripts. A remote attacker can execute arbitrary HTML and script code in a browser in the context of the vulnerable website. This can allow the attacker to create a specially crafted request that will execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server. This may help the attacker to steal cookie-based authentication credentials and launch other attacks.
A vulnerability in PHP Uploader Downloader Version 2.0 allows an attacker to upload a malicious shell to the server. The attacker can then use the shell to execute arbitrary code on the server.
A vulnerability in the ta3arof [datnig] Script Arabic Version allows an attacker to upload a malicious shell to the server. An attacker can register on the website and upload a malicious shell to the server. The malicious shell can be found in the 'members/uploads/' directory.
The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'dbhcms_core_dir' parameter to the 'index.php' script. A remote attacker can execute arbitrary PHP code on the target system by sending a specially crafted request.
Datenator 0.3.0 is vulnerable to SQL Injection due to the lack of input validation on the 'id' parameter in the 'event.php' file. An attacker can exploit this vulnerability by sending a malicious SQL query to the 'event.php' file via the 'id' parameter. This can allow the attacker to gain access to sensitive information from the database.
This module exploits a stack-based buffer overflow in HP Application Recovery Manager OmniInet daemon. By sending a specially crafted MSG_PROTOCOL packet, a remote attacker may be able to execute arbitrary code.
Esinti Web Design Gold Defter is vulnerable to a database disclosure vulnerability. An attacker can exploit this vulnerability by accessing the /data/defter.mdb file on the target system. This will allow the attacker to view the contents of the database, including sensitive information such as usernames and passwords.