Inject script asp to tell the script to take them infected ..
The Joomla component com_jsjobs is vulnerable to SQL Injection. The vulnerability exists in the view.html.php file in the 'categories' section. The code on line 53 does not properly sanitize user input, allowing an attacker to inject malicious SQL queries. This can lead to unauthorized access to sensitive information stored in the server's database.
The Persian E107 script is vulnerable to XSS. An attacker can exploit this vulnerability by registering on the website and then going to the usersettings.php page. They can then edit their signature and insert malicious code, such as a script that redirects users to a different website. This can be used to steal cookies or perform other malicious actions.
The vulnerability allows an attacker to perform SQL injection attacks on the webiz.gr website.
The Aim Web Design website is vulnerable to multiple vulnerabilities including XSS Injection and HTML Injection. These vulnerabilities can be exploited to inject malicious code into the website and potentially compromise user data.
-9999+union+all+select+1,group_concat(username,char(58),password)v3n0m,3,4,5+from+jos_users--
The Joomla Component My Car has multiple vulnerabilities including XSS, Information Disclosure, and Possible SQL Injection. The XSS vulnerability can be exploited by manipulating the 'modveh' parameter in the 'index.php?option=com_mycar&task=1&pagina=0&ordine=preveh&modveh=[XSS]' URI. The Information Disclosure vulnerability can be exploited by manipulating the parameters and URLs, which reveal SQL errors and website path information. The Possible SQL Injection vulnerability can be triggered by using the 'index.php?option=com_mycar&task=1&pagina=-1' URI.
The Easy Address Book WebServer 1.2 is vulnerable to CSRF attacks. An attacker can trick a user into visiting a malicious website that performs actions on the Easy Address Book WebServer on behalf of the user without their consent or knowledge.
This exploit demonstrates how to overwrite the Structured Exception Handling (SEH) chain in the Webby Webserver. By sending a specially crafted HTTP request, an attacker can overwrite the SEH chain and potentially gain control of the program's execution flow.
The webloader v8 script is vulnerable to SQL injection. The 'vid' parameter in the 'vidgoster.php' script is not properly sanitized, allowing an attacker to inject SQL code into the query and manipulate the database.