A vulnerability exists in Questwork Web Content Management system (QuestCMS) which allows an attacker to perform Directory Traversal, SQL Injection and XSS attacks. The Directory Traversal vulnerability exists in the 'theme' parameter of the 'main.php' script, which allows an attacker to read arbitrary files on the server. The SQL Injection vulnerability exists in the 'obj' parameter of the 'main.php' script, which allows an attacker to execute arbitrary SQL queries. The XSS vulnerability exists in the 'cx' parameter of the 'main.php' script, which allows an attacker to inject arbitrary web script or HTML.
This exploit is used to gain access to the user_password from the e107_user table in the database of the e107 CMS. The exploit uses a blind SQL injection vulnerability in the Plugin EasyShop to gain access to the user_password. The exploit is written in Perl and uses the LWP::UserAgent module to send requests to the vulnerable URL.
This exploit allows a local user to gain root privileges by exploiting a vulnerability in the open/ftruncate system call. The vulnerability is present in Linux kernel versions prior to 2.6.22. The exploit works by creating a file with the setgid bit set, and then using the open/ftruncate system call to overwrite the file with malicious code. The malicious code is then executed with root privileges.
A remote SQL-injection vulnerability exists in the e107 Plugin alternate_profiles (newuser.php?id). An attacker can exploit this vulnerability to gain access to the database and execute arbitrary SQL commands. The vulnerability is due to insufficient sanitization of user-supplied input to the 'id' parameter. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable application. Successful exploitation of this vulnerability can result in unauthorized access to sensitive information, modification of data, and other malicious activities.
The exploit involves setting the cookie 'tlAds_login' to 'admin' and setting the path to '/'
Input passed to the 'q' parameter in 'search.aspx' is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Its possible to obtain user's plain text password by this vulnerability.
Adspro is prone to a remote command-execution vulnerability because it fails to sufficiently sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary commands in the context of the webserver process. Successful exploits will result in the complete compromise of the affected computer.
An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. The attacker can specify a malicious file in the ‘padmin’ parameter of the vulnerable application, which will be included in the application’s response. This can allow the attacker to execute arbitrary code on the vulnerable system.
MyForum 1.3 is vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability to gain access to the admin or user login credentials. The exploit code sends a malicious HTTP request to the vulnerable server with the SQL injection payload appended to the URL. If the exploit is successful, the attacker can gain access to the admin or user login credentials.
A remote SQL injection vulnerability exists in SFS Forum (forum.php id). An attacker can exploit this vulnerability to gain access to sensitive information such as usernames, passwords, and emails. The vulnerability is due to improper sanitization of user-supplied input to the 'forum' parameter. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable application. This can allow the attacker to gain access to sensitive information from the database.