WebEdition CMS is vulnerable to Blind SQL Injection. This exploit allows an attacker to extract the username and password of a user from the database. The vulnerability is due to the lack of proper input validation in the 'we_objectID' parameter. An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable parameter. This will allow the attacker to extract the username and password of a user from the database.
A SQL injection vulnerability exists in phpBazar, which allows an attacker to execute arbitrary SQL commands via the 'catid', 'subcatid', and 'adid' parameters in a 'classified.php' script. An attacker can use this vulnerability to gain access to sensitive information such as usernames and passwords. The vulnerability is present in all versions of phpBazar.
This exploit allows an attacker to inject malicious SQL code into the 'cat_id' parameter of the 'categories_portal.php' script in Pars4u Videosharing V1. This can be used to extract information from the database, such as usernames and passwords.
Anzio Web Print Object (WePO) is a Windows ActiveX web page component that, when placed on a web page can 'push' a print job from a file or web server to a user's local printer without having to display the HTML equivalent to that user. By placing WePO code on a web page, you can provide a method whereby the viewer of that web page can request a local print of a host resident print job, archived print job or a report stream through a server-side script request. Anzio Web Print Object is vulnerable to a buffer overflow attack, which can be exploited by remote attackers to execute arbitrary code, by providing a malicious web page with a long 'mainurl' parameter for the WePO ActiveX component.
A vulnerability exists in Active PHP Bookmarks v1.1.02, which allows an attacker to inject arbitrary SQL commands via the 'id' parameter in view_group.php. An attacker can exploit this vulnerability to gain access to the database and execute arbitrary commands.
An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. The attacker can inject arbitrary SQL code in the vulnerable parameter 'id' of the 'tr.php' script. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. This can be exploited to disclose the content of the database, modify data, execute administration operations and potentially compromise the system.
SunShop shopping cart is a full featured ecommerce solution written in php that allows for web masters to run their own online ecommerce operation. Unfortunately there are a number of SQL Injection issues in SunShop that allow for an attacker to have arbitrary access to the SunShop database where they can access information such as customer and administrator details.
A remote SQL injection vulnerability exists in Ad Board, which is a web-based advertisement board. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. This request contains a specially crafted SQL query that can be used to extract sensitive information from the database, such as usernames and passwords. The vulnerable parameter is the 'id' parameter in the 'trr.php' script. An example exploit is www.[target].com/Script/trr.php?id=-91+union+select+1,2,3,concat(0x3a,Username,0x3a,Password),5,6,7,8,9,10,11+from+adminsettings--
An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable script. The vulnerable parameter is ‘id’ which is not properly sanitized before being used in an SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. An attacker can exploit this vulnerability to gain access to the database and extract sensitive information.
TWiki version 4.2.0 is vulnerable to a File Disclosure. It's only possible to exploit the bug if you can access the "/bin/configure" script. The bug is in the open() function. The file is set by visitor, and there is no protection added by the programmer.