netPanzer 0.8 rev 952 is prone to a buffer overflow vulnerability when handling a specially crafted packet. This can be exploited to cause a stack-based buffer overflow by sending a packet with an overly long 'frameNum' value to the server. This may allow remote attackers to execute arbitrary code on the vulnerable system.
A buffer overflow vulnerability exists in PunkBuster for servers, versions minor than v1.229. The authentication mechanism is handled through a parameter called webkey followed by the password and sent by the client using the POST method or directly in the URL. A webkey longer than 1024 byte will cause a buffer overflow in the function which handles the authentication.
The phpCommunityCalendar 4.0.3 is vulnerable to XSS and SQL Injections. An attacker can inject malicious scripts into the LoName parameter of the week.php, month.php and event.php files. An attacker can also inject malicious SQL queries into the query parameter of the month.php, day.php, event.php, delCalendar.php, delAdmin.php, delAddress.php and delCategory.php files.
Docebo 3.0.3/DoceboCMS,DoceboKms,DoceboLms,DoceboCore,DoceboScs are vulnerable to a remote file include vulnerability. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. This can allow the attacker to execute arbitrary code on the server.
UBB.threads is prone to a remote file inclusion vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code in the context of the webserver process.
Fusion News v.1.0 is vulnerable to a remote file inclusion vulnerability due to the use of the register_globals PHP directive. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server, which will include the malicious code in the 'fil_config' parameter. This will allow the attacker to execute arbitrary code on the vulnerable server.
XOOPS is vulnerable to a remote code execution vulnerability due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. This will allow the attacker to execute arbitrary code on the vulnerable server.
This exploit allows an attacker to inject malicious SQL queries into the vulnerable Woltlab Burning Board 2.3.4 web application. The vulnerable parameter is the "cat" parameter in the "links.php" file. By exploiting this vulnerability, an attacker can gain access to the database and extract sensitive information such as usernames and passwords.
CaLogic Calendars version 1.2.2 is vulnerable to a remote file include vulnerability. This vulnerability allows an attacker to include a remote file, usually through a malicious URL, containing arbitrary code which is then executed on the vulnerable server. This vulnerability is due to the application not properly sanitizing user-supplied input to the 'GLOBALS[CLPath]' parameter in the 'reconfig.php' and 'srxclr.php' scripts. An attacker can exploit this vulnerability by crafting a malicious URL containing a malicious script and then convincing an unsuspecting user to click on the link. Successful exploitation can result in arbitrary code execution on the vulnerable server.
A vulnerability in phpMyDirectory <= 10.4.4 allows remote attackers to include arbitrary files via a URL in the ROOT_PATH parameter to cron.php.