This exploit allows an attacker to perform two different attacks on a vulnerable version of phpMyNewsletter. Attack N°1 allows an attacker to inject a shell into the config file if mq=off. Attack N°2 allows an attacker to send previously created newsletters and spam.
This exploit allows an attacker to perform a blind SQL injection attack in XOOPS Module WF-Links version 1.03 or below. The vulnerability allows the attacker to retrieve sensitive information from the database, such as usernames and passwords of the XOOPS users.
Internet Connect application in Apple OSX Panther allows any file on the file system to be altered by creating a symlink file pointing to the file to be altered.
The vulnerability allows an attacker to include a remote file in the application, which can lead to remote code execution. The vulnerability exists in the include.php, /dbcommon/include.php, and /exception/include.php files.
There is a security bug in BOA v0.94.8.2 that allows a malicious user to access files outside the document root of the web server as the user the server runs as.
Dolibarr is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
An attacker can exploit this issue to cause the web server to crash, denying service to legitimate users.
The PhpBrowse script is vulnerable to Remote File Inclusion (RFI) attack. An attacker can exploit this vulnerability by including a malicious file using the 'include' function in the 'include_stream.inc.php' file. The attacker can then execute arbitrary code or perform unauthorized actions on the targeted system.
This module exploits multiple vulnerabilities found in Solarwinds Firewall Security Manager 6.6.5. The first vulnerability is an authentication bypass via the Change Advisor interface due to a user-controlled session.putValue API in userlogin.jsp, allowing the attacker to set the 'username' attribute before authentication. The second problem is that the settings-new.jsp file will only check the 'username' attribute before authorizing the 'uploadFile' action, which can be exploited and allows the attacker to upload a fake xls host list file to the server, and results in arbitrary code execution under the context of SYSTEM. Depending on the installation, by default the Change Advisor web server is listening on port 48080 for an express install. Otherwise, this service may appear on port 8080. Solarwinds has released a fix for this vulnerability as FSM-v6.6.5-HotFix1.zip. You may download it from the module's References section.
The Sisplet CMS is vulnerable to Remote File Inclusion (RFI) attack in the komentar.php file. An attacker can exploit this vulnerability by injecting a malicious URL in the 'site_path' parameter, leading to the inclusion of arbitrary remote files.