Kolifa.Net Download Script is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to manipulate SQL queries by injecting arbitrary SQL code. This may allow the attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
z-breaknews 2.0 is vulnerable to a remote SQL injection vulnerability due to insufficient sanitization of user-supplied input in the 'id' parameter of the 'single.php' script. An attacker can exploit this vulnerability to gain access to the database, extract sensitive information, and execute arbitrary SQL commands.
Crafty Syntax Live Help is a full featured, open source, online support system written in php that allows the visitors of a website to interact in real time with the site owners. There is a couple of high risk SQL Injections in Crafty Syntax Live Help that allows for an attacker to read arbitrary database contents such as user credentials, or administrator credentials. An updated version of Crafty Syntax Live Help is now available and users should upgrade as soon as possible. There is a high risk SQL Injection issue within Crafty Syntax Live Help that allows for an attacker to read arbitrary database contents such as user credentials, or administrator credentials. The vulnerable bit of code in question can be seen below. Since Crafty Syntax Live Help seems to store passwords in plain text by default, it is a trivial task for an attacker to gain administrative access to the installation after exploiting this issue.
A vulnerability in GeekLog <= 1.5.0 allows remote attackers to upload arbitrary files via a modified upload.php script. This exploit requires custom configuration files for it to work.
This exploit allows an attacker to bypass the webinterface password protection of the Belkin wireless G router + adsl2 modem. It works by submitting a form with malicious values to the router's CGI script. This exploit was tested on model F5D7632-4V6 with upgraded firmware 6.01.08.
WebBoard suffers from remote vulnerabilitys, included in this writeup is a method to arbitrary delete the questions and anwsers from the board. its also possible to execute sql querys once you have found a vulnerable website (shouldnt be hard from 2k+ vuln sites) modify the url below to include the victim sites domain, and change the <NUM> tags to a valid question/anwser number execute the url, and the question and anwsers will be deleted. you can also use SQL injection in replace of the <NUM> tags use load_file() to view the config file for username and passwords.
ezContents CMS has Multiple Local File Include vulnerabilities. Vulnerable GET parameter 'link'. First discovered by Zero_X. Vendor fixed vulnerability in version 2.0.3 by adding verification for this parameter. However, attacker still can include local files.
Pluck CMS has Multiple Local File Include vulnerabilities. Vulnerable GET parameters 'blogpost', 'cat' and 'file'. First discovered by AmnPardaz Security Research Team. Vendor fixed vulnerability in version 4.5.2 by blocking directly access to this file. However, attacker still can exploit this vulnerability from index.php file.
The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'name' parameter to '/listing_view.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database. Successful exploitation of this vulnerability may allow an attacker to gain access to sensitive information stored in the database, modify data, compromise the system, etc.
The vulnerability exists due to insufficient sanitization of user-supplied input in 'category' and 'type' parameters of 'index.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database. Successful exploitation of this vulnerability may allow an attacker to gain access to sensitive information stored in the database.