Car Portal is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
This exploit allows an attacker to insert arbitrary scripts into a text file and include it in the 'Posts.php' file, leading to remote code execution.
Horde IMP Webmail is prone to an HTML-injection vulnerability because it fails to sufficiently sanitize user-supplied data before it is used in dynamic content. Attacker-supplied HTML or JavaScript code could run in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials and to control how the site is rendered to the user; other attacks are also possible.
The TOPHangman application fails to properly sanitize user-supplied input, leading to SQL and HTML injection vulnerabilities. An attacker can exploit these vulnerabilities to compromise the application, access or modify data, exploit other latent vulnerabilities in the database, or execute arbitrary script code in the context of an unsuspecting user's browser. This can result in stealing authentication credentials, controlling the site's appearance, and launching further attacks.
The WSN Guest 1.21 version of the Comments.PHP script is vulnerable to SQL Injection. This can be exploited by an attacker to inject malicious SQL code into the 'id' parameter of the script. The exploit allows the attacker to retrieve sensitive information from the database, such as usernames and passwords of the WSN Guestbook members.
MySITE is vulnerable to an SQL-injection vulnerability and a cross-site scripting vulnerability due to inadequate input sanitization. Exploiting these vulnerabilities could allow an attacker to steal authentication credentials, compromise the application, access or modify data, or exploit other vulnerabilities in the database.
An attacker can exploit this issue by enticing a legitimate user to use the vulnerable application to scan a file from a network share location that contains a specially crafted Dynamic Link Library (DLL) file.
An attacker can exploit these issues to cause an affected application to crash, denying service to legitimate users.
This exploit allows an attacker to access sensitive server log files by exploiting a directory traversal vulnerability. By manipulating the 'folder' parameter, the attacker can traverse the file system and access log files located outside the intended directory. The attacker sends a specially crafted HTTP request to the target server, causing it to disclose the contents of the log files in the server's response.
This module exploits a buffer overflow vulnerability in Advantec WebAccess. The vulnerability exists in the dvs.ocx ActiveX control, where a dangerous call to sprintf can be reached with user controlled data through the GetColor function. This module has been tested successfully on Windows XP SP3 with IE6 and Windows 7 SP1 with IE8 and IE 9.