A vulnerability exists in Traidnt Up version 2.0, which allows an attacker to bypass authentication and gain access to the application. This is due to the application not properly filtering user input in the 'adminquery.php' file. An attacker can exploit this vulnerability by setting the 'trupuser' and 'truppassword' cookies to malicious values such as 'admin' or '1'='1'. This will cause the application to return a true value, allowing the attacker to bypass authentication and gain access to the application.
A SQL injection vulnerability exists in Million Dollar Text Links <= 1.0. An attacker can send a specially crafted HTTP request to the vulnerable application in order to execute arbitrary SQL commands in the back-end database. This can be exploited to manipulate SQL queries to view, add, modify and delete records in the back-end database. This may aid in further attacks.
Zeus Cart V2.3 is vulnerable to SQL Injection. An attacker can exploit this vulnerability to gain access to the admin panel of the application. The attacker can use the ‘-9999+union+all+select+concat(0x6272306c79,0x3a,admin_id,0x3a,admin_name,0x3a,admin_password,0x3a,0x6272306c79)+from+admin_table--’ payload to exploit the vulnerability and gain access to the admin panel.
This exploit is a proof-of-concept (PoC) for a stack overflow vulnerability in Adobe Acrobat Reader versions 9.1.1 and earlier. The vulnerability is triggered when a user opens a specially crafted PDF file, which causes a stack overflow and results in a crash. The exploit was published in 2009-crashy_the_clown.pdf.
An attacker can bypass authentication by entering the username as '[admin_name]' or '1=1' and the password as 'No Thing' or '1=1' in the admin.asp page of the Zen Help Desk Version 2.1 application.
Roxio CinePlayer 3.2 is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. An attacker can exploit this issue to execute arbitrary code in the context of the application using the ActiveX control. This may facilitate unauthorized access.
There are 3 vulnerable calls to fopen() in "/webboard/view.php". They are on lines 7, 109 and 113. Due to the trailing ".txt", retrieving files with different extensions will be difficult unless you are able to get a null byte through without it being escaped.
This bug is a simple design bug that results in an endless loop (and interesting memory leaks). Once upon a time Netscape thought it would be a great idea to add the keygen tag (<keygen>) as a feature to their Browser. The keygen tag offers a simple way of automatically generating key material using various algorithms. For instance it is possible to generate RSA, DSA and EC key material.
A SQL injection vulnerability exists in Joomla Component com_jvideo, which can be exploited by malicious people to conduct SQL injection attacks. The vulnerability is caused due to the user_id parameter in the index.php script not being properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation may allow execution of arbitrary SQL code in the context of the database user.
aMember is a flexible membership and subscription management PHP script. It has support for PayPal, BeanStream, 2Checkout, NoChex, VeriSign PayFlow, Authorize.Net, PaySystems, Probilling, Multicards, E-Gold and Clickbank payment systems (see list of integrated payment systems) and allows you to setup paid-membership areas on your site. It can also be used without any payment system - you can manage users manually. CGI Systems' website has an XSS issue too, they obviously don't realise the impact of XSS.