This exploit is related to the Anti-Keylogger Elite Driver (AKEProtect.sys) version 3.3.3.0 and below. It allows an attacker to gain elevated privileges on the system by exploiting a flaw in the driver.
Myiosoft EasyBookMarker v4 (Parent) is vulnerable to SQL Injection. An attacker can exploit this vulnerability to gain access to sensitive information such as version and user details. The vulnerable parameter is 'Parent' which can be found in the URL http://localhost/[path]/plugins/bookmarker/bookmarker_backend.php?pagebm=mfolders&Parent=-99999/**/UNION/**/ALL/**/SELECT/**/1,2,3,concat(version(),0x3a,user()),5--
A SQL injection vulnerability exists in Domain Seller Pro� v1.5. An attacker can send a specially crafted HTTP request containing malicious SQL statements to the vulnerable application in order to gain access to unauthorized information or to manipulate data. This vulnerability affects the 'index.php' script and is triggered when the 'id' parameter is supplied with a maliciously crafted value. This can be exploited to inject arbitrary SQL code in the applications' back-end database, allowing for the manipulation of query results and the retrieval of sensitive data from the database.
A remote SQL injection vulnerability exists in e-topbiz Number Links 1 php. An attacker can send a specially crafted HTTP request containing malicious SQL statements to the vulnerable application in order to manipulate the database. This can be exploited to gain access to sensitive information or to manipulate certain data.
A vulnerability exists in Mini Web Calendar, ver. 1.2, which allows an attacker to perform Cross-Site Scripting (XSS) and File Disclosure (FD) attacks. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow an attacker to execute arbitrary HTML and script code in the context of the affected application or to disclose sensitive information from the server.
E-topbiz Online Store 1 is prone to a remote SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to manipulate SQL queries and gain access to unauthorized information. This issue affects version 1.0; other versions may also be vulnerable.
An attacker can exploit a SQL injection vulnerability in deltascripts phpclassifieds to gain access to sensitive information from the database. The vulnerability exists in the detail.php page, which takes a parameter called 'siteid'. An attacker can inject malicious SQL code into this parameter, which will be executed by the database. This can be used to gain access to sensitive information such as usernames, passwords, and other data stored in the database.
A vulnerability in MyioSoft EasyCalendar allows an attacker to bypass authentication by using the username [real_admin_name] ' or ' 1=1 and the password ZoRLu. Generally, the admin name is 'admin'. A demo of the exploit can be found at http://myiosoft.com/products/EasyCalendar/demo/ with the username demo1 ' or ' 1=1 and the password ZoRLu.
A vulnerability in MyioSoft EasyBookMarker allows an attacker to bypass authentication by using the username [real_admin_name] ' or ' 1=1 and the password ZoRLu. Generally, the admin name is 'admin'. A demo of the exploit can be found at http://myiosoft.com/products/EasyBookMarker/demo/ with the username demo1 ' or ' 1=1 and the password ZoRLu.
A vulnerability in MyioSoft Ajax Portal 3.0 allows an attacker to bypass authentication by using the username [real_admin_name] ' or ' 1=1 and the password ZoRLu. The admin name is generally 'admin'. A demo of the exploit can be found at http://myiosoft.com/products/AjaxPortal/demo/ with the username demo1 ' or ' 1=1 and the password ZoRLu.