This exploit allows an attacker to execute commands on a phpBB forum through the admin_styles.php file. It has been tested on phpBB version 2.0.13. The exploit works by creating a new style and running SQL queries in the database. The attacker can then execute commands through the created file. The exploit also has the ability to retrieve the database prefix.
-9999+union+all+select+0,0,group_concat(es_admin_name,char(58),es_pwd)v3n0m,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0+from+esb2b_admin--
Multiple vulnerabilities have been found in ASPCode CMS. These include multiple XSS vulnerabilities, persistent XSS vulnerability, CSRF vulnerability, and a possible SQL injection vulnerability. The XSS vulnerabilities can be exploited through various URLs, including default.asp?sec=1&ma1= and default.asp?sec=1&tag=. The persistent XSS vulnerability can be exploited by posting in the guestbook section. The CSRF vulnerability allows an attacker to delete a user account or create a super admin account. The possible SQL injection vulnerability can be exploited through the URL default.asp?sec=64&ma1=tag&tag=CMS'.
The exploit involves using the SQL injection vulnerability in the B2B Gold Script (id) software to execute a union-based select statement and retrieve the admin username and password.
-9999+union+all+select+0,0,group_concat(es_admin_name,char(58),es_pwd)v3n0m,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0+from+esb2b_admin--
The Scratcher application is vulnerable to SQL injection and cross-site scripting (XSS) attacks. An attacker can exploit these vulnerabilities to execute arbitrary SQL queries and inject malicious scripts into the application.
This exploit allows an attacker to reset the admin password in versatileBulletinBoard 1.00 RC2. The vulnerability can be found at http://rgod.altervista.org/versatile100RC2.html. The exploit works regardless of the magic_quotes setting.
The SoftBizScripts Dating Script is vulnerable to SQL Injection. An attacker can exploit this vulnerability by injecting malicious SQL queries into the 'browse' parameter of the search_results.php page. This allows the attacker to retrieve sensitive information from the database.
This exploit targets a heap overflow vulnerability in the RegisterCom() function of the AntCore.dll library in Bigant Messenger version 2.52 and earlier. The vulnerability allows an attacker to remotely execute arbitrary code on a vulnerable system. The exploit takes advantage of this vulnerability to create a custom HTTP response that triggers the overflow and executes the attacker's code. This exploit has been tested on Windows XP SP3 with Internet Explorer 6 and 7.
This exploit allows an attacker to escalate privileges in avast! 4.7 by manipulating aavmker4.sys driver. The vulnerability has been assigned CVE-2008-1625. The exploit has been tested on Windows XP SP2 and SP3 with DEP turned on. The exploit was created by Matteo Memelli and can be found at offensive-security.com.