Platnik is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
The Vanilla server in Netrek version <= 2.12.0 is affected by a format string vulnerability. The vulnerability is caused by the calling of the pmessage2() function without the needed format argument. It can be exploited by locking a player who is using a malformed nickname. The EVENTLOG switch must be enabled for exploiting this vulnerability. The exploit code can be found at http://aluigi.org/poc/netrekfs.zip
PHP is prone to multiple format-string vulnerabilities because it fails to properly sanitize user-supplied input before passing it as the format specifier to a formatted-printing function. Attackers can exploit these issues to run arbitrary code within the context of the PHP process. This may allow them to bypass intended security restrictions or gain elevated privileges.
The PHP Banner Exchange application fails to properly sanitize user-supplied input, leading to a cross-site scripting vulnerability. An attacker can exploit this vulnerability to execute arbitrary script code in the browser of a targeted user, potentially stealing authentication credentials and launching further attacks.
The PHP File Uploader application fails to adequately limit the types of files that are uploaded. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process, leading to unauthorized access, privilege escalation, or other attacks.
The NPDS Revolution application fails to properly sanitize user-supplied input, leading to a cross-site scripting vulnerability. An attacker can exploit this vulnerability to execute arbitrary script code in the browser of a victim user, potentially allowing them to steal authentication credentials and launch other attacks.
The NPDS Revolution web application is prone to an SQL-injection vulnerability due to insufficient sanitization of user-supplied data before using it in an SQL query. This vulnerability can be exploited by an attacker to compromise the application, gain unauthorized access or modify data, and potentially exploit other latent vulnerabilities in the underlying database.
The GameCore software is prone to a remote integer-overflow vulnerability. An attacker can exploit this issue to cause a denial-of-service condition.
The Mani Admin Plugin Stats Reader V1.2 is vulnerable to a remote file inclusion vulnerability. An attacker can exploit this vulnerability by manipulating the 'ipath' parameter in the 'index.php' file to include malicious files from a remote server.
C99Shell is prone to a cross-site scripting vulnerability because the application fails to sufficiently sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.