The component is extremly useful when it comes down to implementing some sort of job portal into your Joomla website. Injecting SQL commands while viewing details about a job is possible.
This exploit allows an attacker to inject malicious code into the Edimax AR-7084GA Router. The attacker must first get the victim to be logged in and then open a malicious page. The code should be split into parts because the router limits the VIRTUALSVR_Application parameter length. The malicious code is then injected into the router via a POST request to the vulnerable page.
This exploit is for ZipScan 2.2c (.zip) SEH vulnerability. It creates an evil zip file with a payload of 5000 bytes. The payload contains a POP POP RETN sequence followed by a NOP sled and a shellcode. The shellcode is used to execute malicious code on the target system.
Unfiltered comment is used to create last comments block. An attacker can post any script as comment content which will be executed when the page is loaded.
The ZSploit Team has discovered a vulnerability in Microsoft Internet Explorer 6.0 and 7.0. The vulnerability is caused due to a boundary error in the handling of DataURL parameters. This can be exploited to execute arbitrary code by tricking a user into visiting a malicious web page.
This exploit allows an attacker to add an admin user to the Advanced Management For Services Sites (AM4SS) software. The attacker can use the Dork 'trace find it' to locate vulnerable sites and then use the provided HTML code to add an admin user with the username 'admin', email 'admin@demo.net', password '123456' and group '1'.
A buffer overflow vulnerability exists in IncrediMail 2.0 activeX control due to improper bounds checking of user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable application resulting in arbitrary code execution.
Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected into the otherwise benign and trusted web sites. Cross-site scripting (XSS) attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user in the output it generates without validating or encoding it. CSRF is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. With a little help of social engineering (like sending a link via email/chat), an attacker may force the users of a web application to execute actions of the attacker's choosing. A successful CSRF exploit can compromise end user data and operation in case of normal user. If the targeted end user is the administrator account, this can compromise the entire web application.
The vulnerability exists in the file screen.php, where an attacker can inject a malicious SQL query via the 'view_id' parameter. An example exploit is 'screen.php?view_id=-1+union+select+version()--'
A local crash vulnerability exists in DSEmu 0.4.10 when a specially crafted .nds file is opened. This can be exploited by an attacker to crash the application.