TriO version 2.1 and prior are vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable script browse.php. The vulnerable parameter is 'id' which can be used to inject arbitrary SQL code. An attacker can use this vulnerability to gain access to sensitive information such as usernames, passwords, and other data stored in the database.
EPShop version 3.0 and below is vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow an attacker to gain access to the database and execute arbitrary SQL commands.
Mobius Web Publishing Software is prone to a remote SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to manipulate SQL queries by injecting arbitrary data, allowing for the manipulation or disclosure of arbitrary data. This issue affects versions prior to Mobius 1.4.4.1.
phpwebnews-mysql, suffers from insecure cookie handling, when a admin login is successfull the script creates a cookie to show the rest of the admin area the user is already logged in. the bad thing is the cookie doesnt contain any password or anything alike, therefor we can craft a admin cookie and make it look like we are logged in as a legit admin. The exploit code is javascript:document.cookie = "a1=admin ' or 1=1/*; path=/;"; document.cookie = "a2=[what ever]; path=/;";
This exploit allows an attacker to inject malicious SQL code into the vulnerable application. The vulnerable application is fipsCMS light, which is © fipsASP 2003 - 2008. The exploit code is victim/path/home/index.asp?w=pages&r=9999999 union select all 0,username,null,0x1 from admin and victim/path/home/index.asp?w=pages&r=9999999 union select all 0,password,null,0x1 from admin. The exploit was found by U238 and was published on milw0rm.com in 2008-07-26.
There is absolutly no validation of $image_id + We can se amount of columns - 2. An attacker can exploit this vulnerability by sending a malicious HTTP request with a crafted image_id parameter. The malicious request will be in the form of http://[host]/[phpTest]/picture.php?image_id=-1+union+select+1,concat_ws(0x3a3a,username,password)+from+users/*
Camera Life 2.6.2 is vulnerable to a SQL injection attack. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. The request contains malicious SQL statements that are executed in the backend database. This can allow an attacker to gain access to sensitive information such as usernames and passwords stored in the database.
XMRS Multiple Vulnerabilities (ZeroDay at 25-07-2008) is a vulnerability that affects the XRMS CRM product. It allows an attacker to remotely include files, perform XSS attacks, and gather information. The vulnerable files are activities/workflow-activities.php, multiple files with the variable $msg, and tests/info.php. The required register_globals is set to Yes. Quote limitations are set to Yes. The phpinfo() call is also present.
This exploit is used to exploit the Kaminsky DNS Cache Poisoning Attack vulnerability. It is written in C and requires libdnet (aka libdumbnet-dev under Ubuntu) to compile. It sends a malicious DNS packet to the victim's DNS server, which can be used to poison the DNS cache.
A buffer overflow vulnerability exists in the minix 3.1.2a operating system. An attacker can exploit this vulnerability by sending a large amount of data to the target system via the network connection. This will cause the system to panic and crash.