A Cross-Site Request Forgery (CSRF) vulnerability exists in Simple Blog PHP 2.0, which allows an attacker to add a post with malicious content. An attacker can craft a malicious HTML page and send it to the victim, when the victim visits the page, the malicious post will be added to the blog. Additionally, a Stored Cross-Site Scripting (XSS) vulnerability exists in Simple Blog PHP 2.0, which allows an attacker to inject malicious JavaScript code into the blog post. An attacker can craft a malicious HTML page and send it to the victim, when the victim visits the page, the malicious JavaScript code will be stored in the blog post.
A Cross-Site Request Forgery (CSRF) vulnerability exists in ApPHP MicroCMS 3.9.5 which allows an attacker to add an admin user to the application. The attacker can craft a malicious HTML page containing a form with hidden fields that when visited by an authenticated user, will submit the form and add an admin user to the application. The form contains the parameters mg_prefix, mg_action, mg_rid, mg_sorting_fields, mg_sorting_types, mg_page, mg_operation, mg_operation_type, mg_operation_field, mg_search_status, mg_language_id, mg_operation_code, token, date_lastlogin, date_created, first_name, and last_name.
A stored cross-site scripting vulnerability exists in ApPHP MicroCMS 3.9.5. An attacker can inject malicious JavaScript code into the 'comment_user_name' parameter of the 'index.php?page=posts&post_id=' page, which will be executed in the browser of the victim when the page is viewed.
When a binder object is passed as BINDER_TYPE_BINDER or BINDER_TYPE_WEAK_BINDER, a pointer to that object (in the server process) is leaked to the client process as the cookie value. This leads to a leak of a heap address in many of the privileged binder services, including system_server.
A blind SQL injection vulnerability was discovered in OpenCimetiere v3.0.0-a5. The vulnerability exists in the login.php script, which is vulnerable to an AND/OR time-based blind SQL injection attack. An attacker can exploit this vulnerability by sending a specially crafted POST request to the login.php script with a malicious SQL query in the login parameter. This can allow an attacker to gain access to the database and potentially execute arbitrary code.
Categorizator 0.3.1 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending a crafted HTTP request with malicious SQL statements to the vulnerable application. This can allow the attacker to gain access to sensitive information stored in the database, modify data, execute administration operations on the database, and potentially compromise the underlying system.
The flaw exists within the parsing process of an invalid ARF file. An attacker can use this flaw to create an out-of-bound memory corruption which could allow for the execution of arbitrary code in the context of the current user.
This exploit allows for authenticated remote code execution on a Subversion server. The pre-commit script svn-keyword-check.pl needs to be configured as pre-commit hook. The version shipped with the subversion 1.6.6 contains a bug which prevents it from being used at all. This bug must be fixed (otherwise neither the exploit, nor the intented purpose of the script will work). Scripts before 1.6.23 are vulnerable.
A Cross-Site Request Forgery (CSRF) vulnerability exists in ApPHP MicroBlog 1.0.2 which allows an attacker to add a new author to the application. The attacker can craft a malicious HTML page containing a malicious POST request which when visited by an authenticated user, will add a new author to the application.
ApPHP MicroBlog 1.0.2 is vulnerable to Stored Cross Site Scripting. An attacker can inject malicious JavaScript code in the comment_user_name parameter of the vulnerable URL http://site_name/path/index.php?page=posts&post_id=. The malicious code is then stored in the database and is executed when the page is loaded.