The vulnerability exists due to insufficient sanitization of user-supplied input in the 'mod', 'module' and 'modul' parameters of the 'index.php', 'block_module.php' and 'Suggest/index.php' scripts. A remote attacker can send a specially crafted request to the vulnerable scripts and execute arbitrary PHP code on the vulnerable system with the privileges of the web server process.
PHPAUCTION is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
A SQL injection vulnerability exists in Green Desktiny Customer Support Helpdesk, which allows an attacker to execute arbitrary SQL commands via the 'id' parameter in the 'news_detail.php' script.
MyShoutPro v1.2 Final is vulnerable to Cross Site Scripting (XSS). An attacker can inject malicious JavaScript code into the 'action' and 'page' parameters of the 'index.php' script. This code will be executed in the browser of the victim when the malicious URL is visited.
An attacker can access the backup of the osCommerce online SHop by accessing the URL http://127.0.0.1/oscommerce-2.2rc2a/catalog/admin/backup/login.php?action=backup and http://127.0.0.1/oscommerce-2.2rc2a/catalog/admin/backup/login.php?action=backupnow. The attacker can then download the backup by accessing the URL http://127.0.0.1/oscommerce-2.2rc2a/catalog/admin/backup/login.php?action=download&file=db_comm-20100301222138.sql. The attacker can also access the backup by accessing the URL http://127.0.0.1/oscommerce-2.2rc2a/catalog/admin/file_manager/login.php?action=backup.
A vulnerability in MyCart shopping cart allows an attacker to upload a malicious shell to the web server. The attacker can then use the shell to gain access to the web server and execute arbitrary commands.
The vulnerability exists in Gallery V 2.3, which allows a remote attacker to include a remote file by sending a specially crafted request to the vulnerable application. The attacker can send a malicious request to the vulnerable application and execute arbitrary code on the vulnerable system.
A vulnerability in Mega Upload version 1.45 allows an attacker to upload a malicious shell to the server. The attacker can then use the shell to gain access to the server and execute arbitrary commands.
The vulnerability exists due to insufficient sanitization of user-supplied input in the 'show_today', 'show_year', 'team_s', 'show_month' and 'view.php' parameters of the 'view.php' and 'twg3at.php' scripts. A remote attacker can execute arbitrary HTML and script code in a browser in the context of the vulnerable website. This can allow the attacker to steal cookie-based authentication credentials and to control how the site is rendered to the user; other attacks are also possible.
The vulnerability exists due to insufficient sanitization of user-supplied input in the 'lvc_include_dir' parameter of the 'howex.php3' script. A remote attacker can execute arbitrary PHP code on the vulnerable system by sending a specially crafted HTTP request with a malicious 'lvc_include_dir' parameter.