If the victim is authenticated then it is possible via a number of methods to have the vicitim visit the below example url. A new bookmark entry would be set and the XSS payload inserted and would be triggered when the user visited their bookmarks page. It is also possible to pre-load your own bookmarks page and if another user visits your bookmarks then the payload would also be executed.
Existing site owners can benefit from running a micro blogging service resulting in more viral growth for your website when your users interact with follow friends by receiving updates via our social network platform. With our SMS integration as well as custom API, we allow you to gain more revenues through purchase of SMS credits, revenues from web advertisements and as well benefiting from 3rd party applications built for your site using our API. To exploit the vulnerability, attackers can use ' or 1=1 or ''=' to login and <script>alert(document.cookie)</script> for XSS.
WebBiblio Subject Gateway System is prone to a local file-include vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this vulnerability to include arbitrary local files from the target server.
The idevspot TextAds V2.08 suffers from a SQL injection vulnerability. An attacker can exploit this vulnerability by sending a crafted SQL query to the vulnerable application. This can allow the attacker to gain access to sensitive information stored in the database.
A vulnerability in the Joomla Component com_annonces allows an attacker to upload arbitrary files, including malicious PHP files, which results in arbitrary remote code execution. This vulnerability is due to insufficient validation of the file type being uploaded. An attacker can exploit this vulnerability by uploading a malicious PHP file with a double extension such as “file.php.jpg”.
PHP Car Rental-Script suffers from a SQL Injection vulnerability which allows an attacker to execute arbitrary SQL commands on the vulnerable system. The vulnerability is present in the 'group.php' script, where the 'id' parameter is not properly sanitized before being used in a SQL query.
Sphider is a web spider and search engine written in PHP, using MySQL as its back end database. Sphider is vulnerable to Remote Code Execution. Exploit: http://[target]/[path]/admin/settings_test.php?settings_dir=[shell]
iScripts EasyBiller billing software is an easy way to automate and manage your businesses. iScripts EasyBiller, combined with an integrated helpdesk delivers a powerful, easy-to-use, integrated business solution. SQL injection is found in the easybiller script V1.1. The exploit can be found at http://[url]/easybiller/demo/viewhistorydetail.php?planid=[Sqli].
iScripts eSwap version 2.0 is vulnerable to an SQL injection vulnerability and a cross-site scripting vulnerability due to insufficient sanitization of user-supplied data. An attacker can exploit this vulnerability by sending malicious SQL queries to the application, which can be used to gain access to sensitive information stored in the database. Additionally, an attacker can exploit the cross-site scripting vulnerability by injecting malicious JavaScript code into the application, which can be used to steal user credentials or perform other malicious activities.
Input passed via the "search","sbr","pid","sbl","FilePath" parameters to default.asp is not properly sanitised before being used in a SQL query. Input passed via the "sbr","pr","psPrice" parameters to printpage.asp is not properly sanitised before being used in a SQL query. Input passed to the "search","sbr","p","sbl" parameters in default.asp is not properly sanitised before being returned to the user.