A vulnerability in SOOP Portal 2.0 allows an attacker to upload a malicious ASP shell to the server. An attacker can register on the site and then navigate to the member_form.asp page with the do=5&mid=4 parameters. The current avatar option allows an attacker to browse and upload a malicious ASP shell. The shell is then renamed with the .asp;.jpg extension. The attacker can then access the shell from the uploads folder.
DotWeb Rentals is a simple to operate, ASP/Access database application that can be used to list property owner's homes for rent. Owners post their home, along with up to 6 images and a comprehensive list of details. The application is best suited to small to medium property rental sites and in particular, to holiday rentals such as Spanish property or Polaris World type property rentals.
DGS auto-fulfills the orders by sending a download code, password and download link to your customers instantly. They get the goods, you get the cash! All these happening w/out you lifting a finger. Sell e-books, e-zines, Flash, digital arts, ringtones... Code: ASP 2.0 & VBScript
DocuSafe is a Product Document Management (PDM) system special made for electronics and or mechanical industry. It is used by large manufacturers in several countries and is coded in ASP 2.0 & VBScript. The vulnerability is an SQL Injection vulnerability which can be exploited by sending a maliciously crafted request to the server via the ECO.asp?ECO_ID=[Code] endpoint.
This exploit allows an attacker to modify the profile of a user on a phpKF Forum without the user's knowledge or consent. The exploit is triggered by sending a malicious POST request to the profil_degistir_yap.php page with the parameters gercek_ad, dogum_tarihi, sehir, web, tema_secim, imza, icq, msn, aim, yahoo, and skype. The attacker can then set the values of these parameters to whatever they want, allowing them to modify the user's profile.
The do_trackbacks() function in wp-includes/comment.php does not properly escape the input that comes from the user, allowing a remote user with publish_posts and edit_published_posts capabilities to execute an arbitrary SELECT SQL query, which can lead to disclosure of any information stored in the WordPress database. The $tb_ping variable is pased directly to the trackback() function without any sanitization.
Contact Directory is an application that allows you to set up and share contacts online. It is backed by an Access database and can store thousands of names and contact information in alphabetical categories. The vulnerability is an SQL injection which can be exploited by sending malicious code to the iType parameter in the type.asp page.
ASP Gallery is a web based image gallery application. It is designed to be a complete ready-to-use image listing. However, it is vulnerable to SQL injection attacks. An attacker can inject malicious SQL code into the 'iType' parameter of the 'type.asp' page, which can be used to access or modify the contents of the database.
JobPost is an application ideal for the small or independent business or association who need a way to post and update job openings internally or on the internet. Ideal for intranets Backend by Access database, JobPost can store thousands of job postings in categories. An attacker can exploit this vulnerability by injecting malicious SQL code into the 'iType' parameter of the 'type.asp' page.
Project Reporter is an application for any organization that needs to share information on projects in real time. By manipulating the 'iType' parameter in the 'type.asp' page, an attacker can inject malicious SQL code into the backend Access database.