Toast Forums v1.8 is vulnerable to a database disclosure vulnerability. An attacker can access the database file (data.mdb) which contains sensitive information such as usernames, passwords, and other data.
This exploit allows an attacker to bypass the open_basedir restriction in PHP 5.2.12 and 5.3.1. The exploit creates a symlink to a file outside the open_basedir restriction, allowing the attacker to access the file.
An attacker can gain admin login credentials by exploiting a blind SQL injection vulnerability in the Joomla Component City Portal. The vulnerability can be exploited by appending a malicious SQL query to the URL. For example, an attacker can append 'and 1=0' to the URL to check if the query is valid. If the page loads without any errors, the query is valid and the attacker can append 'and 1=1' to the URL to gain access to the admin login credentials.
An attacker can exploit this vulnerability to gain access to admin login credentials. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'id' parameter of the 'index.php' script. An attacker can send a specially crafted HTTP request with malicious SQL statements to the vulnerable script and execute arbitrary SQL commands in the back-end database. This can allow the attacker to access or modify data in the back-end database, or gain access to sensitive information such as admin login credentials.
Admin login bilgileri alinabilir. Demo Vuln. : TRUE(+) http://server/index.php?option=com_zcalendar&task=view&vmode=e&eid=236 and 1=1 FALSE(-) http://server/index.php?option=com_zcalendar&task=view&vmode=e&eid=236 and 1=0
An attacker can exploit this vulnerability to gain access to admin login credentials by exploiting the SQL injection vulnerability in the com_acmisc component of Joomla.
An attacker can gain admin login credentials by exploiting a SQL injection vulnerability in the Joomla component com_digistore. The vulnerability exists due to insufficient filtration of malicious characters in the 'cid[]' parameter of the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. This can allow the attacker to gain access to the admin login credentials.
This vulnerability allows an attacker to gain access to admin login credentials. The vulnerability is caused due to the lack of proper input validation of user-supplied data. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can result in the execution of arbitrary SQL commands in the back-end database.
Security researcher Jordi Chancel reported an issue similar to one fixed in mfsa2009-44 in which a web page can set document.location to a URL that can't be displayed properly and then inject content into the resulting blank page. An attacker could use this vulnerability to place a legitimate-looking but invalid URL in the location bar and inject HTML and JavaScript into the body of the page, resulting in a spoofing attack.
An SQL injection vulnerability exists in Schweizer NISADA Communication CMS. An attacker can send a maliciously crafted HTTP request to the vulnerable server, which can allow the attacker to gain access to the database and extract sensitive information such as usernames and passwords.