A memory corruption vulnerability exists in Mozilla Firefox when handling certain HTML elements. An attacker can exploit this vulnerability by crafting a malicious HTML page with specially crafted HTML elements that can cause a memory corruption when rendered by the browser. This can lead to arbitrary code execution.
Many parameters are not properly sanitised before being used in SQL queries and from some PHP's functions. Changing require('Cart.php') in require('../Cart.php') is possibile to execute remote commands by injecting them using the $image variable. The same security flaw is present also in removeItemResponse.php and in removeCategoryResponse.php via SQL Injection. Successful exploitation requires that register_globlas is set to Off. For removeCategoryResponse.php, successful exploitation requires that magic_quotes_gpc is set to Off. Many parameters are not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation requires that magic_quotes_gpc is set to Off. Many parameters are not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation requires that magic_quotes_gpc is set to Off. Many parameters are not properly sanitised before being used in HTML pages. This can be exploited to inject and execute arbitrary HTML and script code in a user's browser session in context of an affected site. Successful exploitation requires that magic_quotes_gpc is set to Off.
A SQL injection vulnerability exists in the iMoveis software, which allows an attacker to inject malicious SQL queries into the application. The vulnerability is triggered when an attacker sends a specially crafted HTTP request containing malicious SQL queries to the vulnerable application. This can result in the execution of arbitrary SQL commands on the underlying database, allowing the attacker to gain unauthorized access to sensitive data.
MinialiC Webserver v1.0 is a Windows based HTTP server. This is the latest version of the application available. MinialiC Webserver v1.0 is vulnerable to common remote source disclosure attacks. An attacker can use the following URLs to access the source code of the web page or download files from the server: http://[ webserver IP][:port][/.../]index.html (Source Disclosure) and http://[ webserver IP][:port][/.../]logo.bmp (File Download).
Sending a request with a length greater than or equal to 2048 bytes causes the server to crash.
A directory traversal vulnerability in MinaliC Webserver 1.0 can be exploited to read files outside of the webroot directory. The exploit uses the '..%2f' and '..%5c' strings to traverse the directory structure.
User can execute arbitrary JavaScript code within the vulnerable application. The vulnerability exists due to failure in the blog elements saving script to properly sanitize user-supplied input in 'body' variable. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data. An attacker can use browser to exploit this vulnerability.
User can execute arbitrary JavaScript code within the vulnerable application. The vulnerability exists due to failure in the "users.php" script to properly sanitize user-supplied input in "msn","aim","first_name" and "last_name" variables. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data. An attacker can use browser to exploit this vulnerability.
The vulnerability exists due to failure in the "/admin/users.php" script to properly verify the source of HTTP request. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data. Attacker can use browser to exploit this vulnerability.
The vulnerability exists due to failure in the "/index.php" script to properly sanitize user-supplied input in gender variable. The following PoC is available: <form action="http://host/index.php?page=8" method="post"><input type="hidden" name="un" value="testuser"><input type="hidden" name="pwd" value="123456"><input type="hidden" name="pwd2" value="123456"><input type="hidden" name="em" value="email@email.com"><input type="hidden" name="gender" value="'SQL_CODE_HERE"><input name="send" value="Register & Create Account" type="submit"></form>