The vulnerability allows remote attackers to inject arbitrary web script or HTML via a parameter in the phpinfo() page.
The vulnerability allows a remote attacker to perform administrative actions and gain unauthorized access to the affected application.
The Home FTP Server is prone to a cross-site request-forgery vulnerability. Exploiting this issue may allow a remote attacker to perform certain administrative actions and gain unauthorized access to the affected application. Other attacks are also possible.
BackLinkSpider is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
The md5 Encryption Decryption PHP Script is vulnerable to a cross-site scripting (XSS) attack due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability by injecting arbitrary script code into the affected website, potentially leading to the execution of malicious scripts in the browser of unsuspecting users. This can result in the theft of authentication credentials and enable further attacks.
The 360 Web Manager is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
RuubikCMS is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
GetSimple CMS is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
The HTML-injection vulnerability in razorCMS allows attacker-supplied HTML or JavaScript code to run in the context of the affected site. This can potentially lead to the theft of cookie-based authentication credentials and control over how the site is rendered to the user.
This PHP script demonstrates a crash exploit using the wddx_deserialize() function. By passing a specially crafted XML payload to the function, it causes a buffer overflow and crashes the script.