Q-News is prone to a remote file include vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary remote PHP code on an affected computer with the privileges of the Web server process. This may facilitate unauthorized access.
This is a proof of concept exploit that affects unpatched Windows 2000 machines with the .printer ISAPI filter loaded. It allows for EIP overruns at position 260, with 19 bytes of code to jump back to the beginning of the buffer. The exploit includes a 4 byte EIP jumping into a jmp esp located in mfc42.dll. The buffer itself has approximately 250 bytes before the overflow and 211 bytes after it. The overflow occurs in the Host: header of the .printer extension, with certain characters causing issues. The exploit can be compiled on Windows, Linux, and *BSD systems and uses a simple TCP vector.
The Athena PHP Website Administration application is prone to a remote file include vulnerability. This vulnerability occurs due to a failure in the application to properly sanitize user-supplied input. An attacker can exploit this vulnerability by injecting a malicious URL as the value of the 'athena_dir' parameter in the 'athena.php' script. This allows the attacker to execute arbitrary remote PHP code on the affected system with the privileges of the web server process, potentially leading to unauthorized access.
PBLang is prone to multiple HTML injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in dynamically generated content.Attacker-supplied HTML and script code would be executed in the context of the affected Web site, potentially allowing for theft of cookie-based authentication credentials. An attacker could also exploit this issue to control how the site is rendered to the user; other attacks are also possible.
AgileBill is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly santize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
Support Center is prone to multiple SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
eFiction is vulnerable to SQL injection, remote file upload, and cross site scripting vulnerabilities. These vulnerabilities allow an attacker to view and modify sensitive information, gain unauthorized access, modify and corrupt the underlying database application, and obtain a victim's authentication credentials. An example of the SQL injection exploit is the 'UNION SELECT' statement in the 'viewuser.php' page.
eFiction is prone to SQL injection, remote file upload, and cross site scripting vulnerabilities. These vulnerabilities may allow an attacker to view and modify sensitive information, gain unauthorized access, modify and corrupt the underlying database application, and obtain a victim's authentication credentials.
The vulnerabilities in eFiction allow an attacker to view and modify sensitive information, gain unauthorized access, modify and corrupt the underlying database application, and obtain a victim's authentication credentials. An example exploit URL is provided.
eFiction is prone to SQL injection, remote file upload, and cross site scripting vulnerabilities. These vulnerabilities may allow an attacker to view and modify sensitive information, gain unauthorized access, modify and corrupt the underlying database application, and obtain a victim's authentication credentials.