Include vulnerability exists in the admin/auth.php file of EternalMart Guestbook 1.1.0. An attacker can exploit this vulnerability by sending a malicious URL in the emgb_admin_path parameter. This can allow the attacker to execute arbitrary code on the vulnerable system.
MkPortal is vulnerable to Cross Site Request Forgery (CSRF) attacks. An attacker can craft a malicious URL that, when visited by an administrator, will delete a message from the urlobox. The malicious URL is posting [img]?ind=urlobox&op=delete&idurlo=X[/img] in MkPortal urlobox where X is an ID of a message. When the administrator visits the URL, the message with the ID X will be deleted.
A vulnerability exists in inertianews 0.02b which allows a remote attacker to include a file from a remote host. The vulnerability is due to the 'inews_path' parameter in 'inertianews_main.php' not properly sanitized before being used in a 'require' statement. This can be exploited to include arbitrary files from remote hosts resulting in arbitrary remote code execution.
This exploit is used to gain access to the Ixprim 1.2 CMS system by exploiting a blind SQL injection vulnerability. It searches for a comment posted on the system, then searches for the administrator's uid, username length, username, password hash, full path disclosure, and confidential ixp code.
This vulnerability allows an attacker to access files outside of the web root directory. This is done by using the '../' directory traversal technique. An attacker can use this vulnerability to access sensitive files such as boot.ini.
PowerClan footer.inc.php does not initialize the $settings[footer] variable before using it to include files, assuming register_globals = on, we can initialize the variable in a query string and include a remote file of our choice.
Dream FTP v1.02 also has anonymous logins enabled by default which enables anyone to crash the server at will. But if the anonymous logins have been disabled try it with a another user/pass account. The exploit sends an evil buffer of 40 characters to the server, which causes the server to crash.
Newxooper-php v0.9.1 is vulnerable to a remote file include vulnerability. The vulnerability exists in the compteur/mapage.php file, in line 37, where the variable $chemin is not properly sanitized before being used in a REQUIRE statement. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable script, which will then include and execute the malicious code.
A vulnerability in PHPBuilder v0.0.2 allows an attacker to read arbitrary files on the server by sending a specially crafted HTTP request. The vulnerability exists due to insufficient sanitization of user-supplied input to the 'filename' parameter of the 'htm2php.php' script. An attacker can exploit this vulnerability by sending a malicious HTTP request containing directory traversal sequences (e.g. '../../../../../etc/passwd') to the vulnerable script. Successful exploitation will result in the disclosure of sensitive information.
This exploit allows an attacker to view the source code of the vulnerable application. The vulnerability exists due to insufficient sanitization of user-supplied input to the 'file' parameter in 'index.php' script. A remote attacker can send a specially crafted HTTP request with arbitrary file name and view the source code of the application.