PHPAuctionSystem is vulnerable to insecure cookie handling. An attacker can inject malicious code into the cookie and gain access to the system. The exploit code is given in the text, which sets the cookie values to the given ID, real name, username and email.
Heapspray is a type of vulnerability that allows an attacker to inject malicious code into a vulnerable system. The malicious code is then executed by the system, allowing the attacker to gain access to the system. The vulnerability is usually exploited by using a specially crafted JavaScript code that is injected into the system. The code is then executed by the system, allowing the attacker to gain access to the system.
The vulnerability exists due to insufficient sanitization of user-supplied input in 'user_id' and 'auction_id' parameters of 'profile.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database. Also, an attacker can inject arbitrary web script or HTML in the vulnerable page. Successful exploitation of this vulnerability may allow an attacker to gain access to sensitive information, modify data, execute arbitrary SQL commands and inject arbitrary web script or HTML.
VUPlayer v2.49 is vulnerable to a local buffer overflow vulnerability when a specially crafted .wax, .m3u, or .pls file is opened. This can be exploited to execute arbitrary code by corrupting the stack and overwriting the return address with a pointer to the malicious code. The exploit code creates a malicious .m3u file which contains 1012 A's followed by a return address pointing to the malicious code, 4 NOPs, and the malicious code itself.
A vulnerability exists in Joomla's com_phocadocumentation module which allows an attacker to inject arbitrary SQL commands. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can result in the compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
A vulnerability in the Joomla com_na_newsdescription module allows an attacker to inject arbitrary SQL commands. This can be exploited to manipulate SQL queries by e.g. injecting arbitrary table names. This may allow an attacker to disclose the contents of the database, modify data, or exploit further vulnerabilities.
Cybershade CMS 0.2b is vulnerable to a Remote File Inclusion (RFI) vulnerability due to improper validation of user-supplied input. An attacker can exploit this vulnerability to execute arbitrary code on the vulnerable system by supplying a malicious URL in the “THEME_header” parameter of the “index.php” script.
A SQL injection vulnerability exists in the com_simple_review component of Joomla. An attacker can exploit this vulnerability to gain access to the database and execute arbitrary SQL commands. The vulnerability is due to insufficient sanitization of user-supplied input in the 'category' parameter of the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. Successful exploitation of this vulnerability can result in unauthorized access to the database and execution of arbitrary SQL commands.
Ayemsis Emlak Pro is prone to an authentication bypass vulnerability due to a SQL injection issue. An attacker can exploit this issue to gain access to the application and perform unauthorized actions. This issue affects the 'Login.asp' script. An attacker can supply a specially crafted username and password to bypass authentication and gain access to the application.
Ayemsis Emlak Pro is vulnerable to a database disclosure vulnerability. An attacker can exploit this vulnerability by accessing the acc.mdb file located in the Pack/bad/ directory. This file contains the database information for the application, including usernames and passwords. The attacker can then use this information to gain access to the application.