This exploit is typically used for remotely exploitable vulnerabilities that can lead to system compromise.
A SQL injection vulnerability was discovered in phpwebnews-mysql 0.2. An attacker can exploit this vulnerability to gain access to the database and execute arbitrary SQL commands.
Here, we have a classic SQL MySQL injection. The GET variable 'id_kat' isn't sanitized before being passed to the query. By injecting our string, the query becomes: select * from berita where status='tampil' and kode_kategori=null UNION ALL SELECT 1,2,3,4,concat(user,0x3a,passwd),6,7,8,9,10,11,12,13 FROM user-- and isi_berita like %'$m_txt'% order by tgl desc. The comment renders the rest of the query to be useless. We are effectively grabbing the first user from the table 'user', which is the admin. You can inject the other strings with server variables and attempt to fetch mysql.user hashes, if the conditions apply.
This exploit allows an attacker to inject malicious SQL queries into a vulnerable web application. The exploit is a blind SQL injection, meaning that the attacker can not see the results of the query, but can determine if the query was successful or not. The exploit is used to gain access to the database and extract sensitive information such as usernames and passwords.
A remote file include vulnerability exists in phPortal 1.2 Beta due to improper validation of user-supplied input. An attacker can exploit this vulnerability to execute arbitrary code on the vulnerable system.
A vulnerability in Joomla Component is v 1.0.1 allows an attacker to perform a remote SQL injection attack. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'marka' and 'motor' parameters of the 'index.php' script. A remote attacker can execute arbitrary SQL commands in the application database, gain access to sensitive data, modify data, and compromise the application and the underlying system.
A remote SQL injection vulnerability exists in Joomla Component QuickTime VR v 0.1. An attacker can exploit this vulnerability to gain access to the admin panel of the application. The vulnerability is due to improper sanitization of user-supplied input in the 'room_id' parameter of the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. Successful exploitation of this vulnerability can allow an attacker to gain access to the admin panel of the application.
A vulnerability in Joomla Component Brightcode Weblinks allows an attacker to execute arbitrary SQL commands via the 'catid' parameter in a 'index.php' call. An attacker can use the 'UNION SELECT' SQL injection technique to extract data from the database, including sensitive information such as usernames and passwords.
A Local File Inclusion (LFI) vulnerability exists in CMS little 0.0.1. An attacker can exploit this vulnerability to include arbitrary files from the local system, such as boot.ini or /etc/passwd, by sending a specially crafted HTTP request to the vulnerable application. This can be done by sending a request to the vulnerable index.php file with the template parameter set to a relative path of the file to be included.
xchangeboard 1.70 final and lower is vulnerable to an SQL injection vulnerability. An attacker can exploit this vulnerability to gain access to user credentials like passwords which are saved as cookies. The PoC for this exploit is http://site.com/path/newThread.php?boardID=+999999%20union%20select%20email,concat_ws(0x3a,nick,substring(password,1,100)),email,email,email%20from%20user/*