A SQL injection vulnerability exists in XOOPS Module: tadbook2, which allows an attacker to execute arbitrary SQL commands via the 'book_sn' parameter in open_book.php. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. The vulnerability is confirmed in version 2.0. The vulnerability is also present in other versions.
This exploit allows an attacker to gain access to the database of a vulnerable phpMDJ application. The exploit uses a blind SQL injection vulnerability to extract the password of a given user. The exploit sends a specially crafted HTTP request to the vulnerable application, which then returns a response indicating whether the character at the given position of the user's password is correct or not.
A SQL injection vulnerability exists in DZcms v.3.1, a content management system developed by CyDezines. An attacker can exploit this vulnerability to gain access to the database and extract sensitive information such as usernames and passwords. The vulnerability is triggered when an attacker sends a maliciously crafted HTTP request to the vulnerable application. The Google Dork “Powered by DZcms” can be used to identify vulnerable websites. A proof-of-concept (POC) is available at http://www.demo.com/products.php?pcat=1'+union+select+all+convert(group_concat(username,0x3a,password)%20using%20latin1),2,3,4,5+from+users/* and a demo is available at http://www.psgdynamicsystems.com/products.php?pcat=1'+union+select+all+convert(group_concat(username,0x3a,password)%20using%20latin1),2,3,4,5+from+users/*. The vulnerability was discovered by Glafkos Charalambous and was published on milw0rm.com on January 11, 2009.
Browse3D v3.5 is vulnerable to a local buffer overflow vulnerability. An attacker can create a specially crafted .sfs file, containing a malicious payload, which when opened with Browse3D v3.5, can cause a buffer overflow, resulting in arbitrary code execution.
This exploit is a denial of service attack against Microsoft Windows .CHM files. It creates a malicious .CHM file which when opened, causes the application to crash.
A vulnerability exists in Fast Guest Book, which allows an attacker to bypass authentication and gain access to the admin panel. This is due to the application failing to properly sanitize user-supplied input before using it in an SQL query. An attacker can exploit this vulnerability by supplying a specially crafted 'or' statement in the username field.
An SQL injection vulnerability exists in the Joomla and Mambo newsflash component. An attacker can exploit this vulnerability to gain access to the database and execute arbitrary SQL commands. The vulnerable parameter is the 'id' parameter in the 'com_newsflash' component. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable web application.
A vulnerability in the Joomla module com_jashowcase allows an attacker to inject arbitrary SQL commands via the 'section&id=' parameter. This can be exploited to gain access to the database and extract sensitive information such as user credentials.
A vulnerability in the Joomla module com_xevidmegahd allows an attacker to inject malicious SQL commands into the application. This can be exploited to gain access to the database and potentially gain access to sensitive information.
VUPlayer 2.49 is vulnerable to a buffer overflow vulnerability when processing a specially crafted .ASX file. The vulnerability is caused due to a boundary error when handling the 'HREF' parameter within the .ASX file. This can be exploited to cause a stack-based buffer overflow by supplying a long string of data in the 'HREF' parameter.