This exploit is based on a SQL injection vulnerability discovered by Valentin Hoebel on 13th April 2010. It exploits the vulnerability by trying to get the amount of columns and then trying to get the data.
An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable application. The request contains a malicious SQL query in the 'productId' parameter, which allows the attacker to extract information from the database.
Apache Axis2 is vulnerable to a local file inclusion vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing a maliciously crafted URL parameter to the vulnerable server. This URL parameter can be used to include a malicious file from the server's local file system. The malicious file can then be used to gain access to the server's resources or to execute arbitrary code on the server.
Schaf-CMS 1.0 is vulnerable to SQL Injection. The vulnerable file is cms.php?id= [SQL]. An example exploit is +or+(select+count(*)+from+(select+1+union+select+2+union+select+3)x+group+by+concat(concat_ws(0x0b,version(),user(),database(),@@version_compile_os),floor(rand(0)*2)))--+
The vulnerability exists in the 'news_more.php' script, which allows an attacker to inject malicious SQL queries via the 'id' parameter. An example of a malicious URL is http://[target]/[path]/news_more.php?id=-9999+union+all+select+1,2,concat(id,0x3a,user,0x3a,pass),4,5,6,7,8+from+users/*
An attacker can exploit a SQL injection vulnerability in Telia Web Design (index.php) to gain access to the admin panel. The attacker can send a malicious HTTP request to the vulnerable application, which contains a specially crafted SQL query in the 'id' parameter. This query will return the username and password of all users in the database, allowing the attacker to gain access to the admin panel.
An attacker can exploit a SQL injection vulnerability in the runt-communications Design property_more.php script to gain access to the admin panel. The attacker can send a malicious HTTP request to the property_more.php script with an ID parameter set to a value of -9999 union select 0,version(),2,3,group_concat(username,0x3a,password),5,6,7,8,9,10,11 from users. This will allow the attacker to gain access to the admin panel located at http://localhost/[path]/admin.
This exploit allows an attacker to execute arbitrary code on a vulnerable e107 version <= 0.7.20. The exploit is triggered by sending a malicious POST request to the contact.php page with a specially crafted payload. The payload is then executed on the server.
infoware is vulnerable to SQL Injection. The vulnerability exists in the faq.php page, where the 'catid' parameter is vulnerable to SQL Injection. An attacker can inject malicious SQL queries to gain access to the database and extract sensitive information.
eCreo is vulnerable to SQL injection. An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable application. This can be done by appending malicious SQL queries to the vulnerable parameter 'nr' in the 'go.php' page. This can allow an attacker to gain access to sensitive information stored in the database.