XAMPP is vulnerable to a remote file disclosure attack. The vulnerability exists within the web application supplied with XAMPP. showcode.php relies on basename($_SERVER['PHP_SELF']) to retrieve the path. What $_SERVER['PHP_SELF'] actually does is retrieve is the path of the requested file. basename() parses the last element of that path using "/" as a delimiter. Traveling through the directory tree, though, requires the "/" character that is used by basename() as a delimiter. Therefor directory traveling it is not achieved but it is possible to view file contents from any drive, and the XAMPP htdocs directory. XAMPP is also vulnerable to a Cross Site Scripting attack. The vulnerability exists within the web application supplied with XAMPP. The vulnerability is caused due to the application not properly sanitizing user-supplied input. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
Auto CMS is vulnerable to Remote Code Execution vulnerability. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. This request contains a maliciously crafted CMD parameter which is then base64 encoded and passed to the passthru() function. This allows an attacker to execute arbitrary code on the vulnerable server.
An unauthenticated attacker can exploit this vulnerability to gain access to the admin login credentials by exploiting the vulnerable parameter 'catid' in the URL.
An SQL injection vulnerability exists in the Joomla component com_flipwall, which allows attackers to gain access to admin login credentials. An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable parameter 'catid' in the URL. The malicious query will return the admin username and password.
MetInfo 3.0 is vulnerable to PHP code injection. This vulnerability exists due to the lack of proper sanitization of user-supplied input in the 'allclass[0]' parameter of the 'common.inc.php' script. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable script. This can allow the attacker to execute arbitrary code on the vulnerable system.
MetInfo 2.0 is vulnerable to PHP code injection due to a lack of user input validation. At line 132 of ROOTPATH/include/common.inc.php, the variable $class2_all_1[0] is not defined, allowing an attacker to inject arbitrary PHP code via a crafted HTTP request. This can be exploited to execute arbitrary code on the vulnerable system.
The vulnerability allows an unprivileged attacker to read files whom he has no permissions to. The vulnerable FTP command are: GET - Read File.
A malicious MP3 file with a size of 707570 bytes can be created to cause a Denial of Service in yPlay version 2.4.5. The file must be opened with yPlay to cause the Denial of Service.
The application is vulnerable to Cross-site Scripting (XSS) via the 'do' parameter in the 'cp.php' script. An attacker can inject arbitrary JavaScript code into the application. Additionally, the application saves subscribed email addresses and correspondent IP addresses to plain text file el.txt, which can be accessed by an attacker.
Zoopeer 0.1 & 0.2 (fckeditor) is vulnerable to a shell upload vulnerability. An attacker can exploit this vulnerability by navigating to the fck/editor/filemanager/browser/default/browser.html?Type=File&Connector=connectors/php/connector.php page and selecting a PHP file renamed via the php4 (shell.php4) extension. This will allow the attacker to upload a malicious file to the server.