The Walking Club is vulnerable to an authentication bypass vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This will allow the attacker to bypass the authentication process and gain access to the application.
eReservations is prone to an authentication-bypass vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to gain access to the application without providing valid credentials.
eFAQ is prone to an authentication bypass vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to gain access to the application and perform unauthorized actions. This issue affects version 1.0.0; other versions may also be vulnerable.
This exploit causes a denial of service on Novell Netware 6.5 (ICEbrowser) by creating a page with a JavaScript URI decode containing a large number of 'A' characters. After the target views the exploit page, the browser will hang and a fault occurs, causing the system to reboot.
A SQL injection vulnerability exists in the Free Bible Search PHP Script (readbible.php) which allows an attacker to execute arbitrary SQL commands on the underlying database. This is achieved by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. An attacker can exploit this vulnerability to gain unauthorized access to sensitive information stored in the database, modify data, execute administration operations on the database and in some cases even issue commands to the operating system.
This exploit is used to find the sha1 hash of the password of a user in Blue Eye CMS <= 1.0.0. It uses a blind SQL injection vulnerability to find the password of the user. The exploit takes the hostname, path and username as arguments and finds the sha1 hash of the password of the user.
An SQL injection vulnerability exists in the Joomla component RDAutos (com_rdautos) version 1.5.5 Stable. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to sensitive information stored in the back-end database.
A vulnerability in Ciansoft PDFBuilderX 2.2 allows an attacker to overwrite arbitrary files on the system. This is due to the application not properly validating user-supplied input when saving a file. An attacker can exploit this vulnerability by convincing a user to open a maliciously crafted HTML file. Successful exploitation could result in the attacker overwriting arbitrary files on the system.
This exploit is used to exploit a blind SQL injection vulnerability in Joomla's com_Eventing component. It uses a combination of SQL queries and web requests to extract the username and password of the administrator from the database.
GNUBoard is a widely used bulletin board system of Korea. It is freely available for all platforms that supports PHP and MySQL. But a file include vulnerability affects SIR GNUBoard. In special conditions,it may be used as a remote file include vulnerability which can be used to execute arbitrary PHP code on an affected computer with the privileges of the affected Web server.