SchoolMation Version 2.3 is vulnerable to SQL injection and XSS attacks. An attacker can gain access to the database and modify or delete data. An attacker can also inject malicious code into the application, which can be used to steal user credentials or other sensitive information.
Awcm Cms is vulnerable to Local File Inclusion vulnerability. An attacker can exploit this vulnerability to include a remote file on the web server. This vulnerability exists due to insufficient sanitization of user-supplied input to the 'v' parameter in 'notify.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with malicious input to the vulnerable script. Successful exploitation of this vulnerability can result in arbitrary remote file inclusion.
This exploit is for BtiTracker 1.3.X - 1.4.X. It is a Local File Inclusion (LFI) exploit which allows an attacker to gain access to the /etc/passwd file of the vulnerable system. The exploit is triggered by sending a specially crafted HTTP request to the vulnerable server.
A local buffer overflow vulnerability exists in ActivePerl version 5.8.8.817. An attacker can exploit this vulnerability to execute arbitrary code in the context of the application. The vulnerability is due to insufficient boundary checks when handling user-supplied input. An attacker can exploit this vulnerability by supplying a specially crafted input to the vulnerable application. Successful exploitation of this vulnerability can result in arbitrary code execution in the context of the application.
PHP Property Rental Script is vulnerable to SQL injection and XSS. An attacker can inject malicious SQL queries into the vulnerable parameter 'PID' in the 'view.php' page. An attacker can also inject malicious JavaScript code into the vulnerable parameter 'PID' in the 'view.php' page.
Joomla com_jnewsletter component is vulnerable to SQL injection. An attacker can inject malicious SQL queries via the "id" parameter in the "index.php" page.
PHPAccess allows you to easily safe your Website against unallowed access. It offers an intuitive and easy-to-use user-interface that displays current information and possible actions on one page. You don't have to know anything about the complex unix-htaccess-system nor do you have to create the .htaccess- / .htpasswd-files. PHPAccess does this job for you. You even don't have to know the absolute path to your website - PHP finds this information automatically. With PHPAccess you can add, modify and delete the users that have access to your data. All you have to do is upload the PHPAccess-file, give it the correct file-permissions (via ftp-proggie) and start PHPAccess in your web-browser.
Eicra Real Estate Script is a fully scalable turn-key PHP MySQL Real Estate. Charge members to list ads or run in free mode. It is a powerful combination of the most desired features and easy-to-use interface for property management tasks. This professional real estate system allows you to automate and simplify the realty business process. With this solution be able to transform your business into a more efficient, productive and prosperous e-business enterprise. EicraRealEstate is a fully scalable turnkey PHP MySQL real estate script allowing site administrators to charge members to list properties.
SFIAB is vulnerable to SQL Injection and XSS attacks. The vulnerability is due to the lack of proper input validation and sanitization of user-supplied data. An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable application. This can allow an attacker to gain access to sensitive information stored in the database, such as usernames, passwords, and other confidential data. Additionally, an attacker can also inject malicious JavaScript code into the application, which can be used to steal user credentials or perform other malicious activities.
Joomla com_jsubscription from ijoobi suffers from a SQL injection vulnerability. An attacker can inject arbitrary SQL code via the 'id' parameter in a GET request.