A SQL injection vulnerability exists in the Joomla Component com_flash. An attacker can send a specially crafted request to the vulnerable application to execute arbitrary SQL commands in the back-end database.
This exploit allows an attacker to read sensitive files on the server by exploiting a Local File Inclusion (LFI) vulnerability in STACK version 1.1. The vulnerability exists due to insufficient sanitization of user-supplied input in the "action" parameter of the "documentation.php" script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal sequences (e.g. "/../") and a null byte (%00) to the vulnerable script. This will allow the attacker to read sensitive files on the server, such as the "/etc/passwd" file.
The vulnerability exists in the 'index.php?shownews=' parameter of the PowieSys <= 0.7.7 alpha script. An attacker can exploit this vulnerability by sending a crafted HTTP request with a malicious payload to the vulnerable parameter. This can allow the attacker to execute arbitrary SQL queries on the underlying database, potentially leading to the disclosure of sensitive information.
Donar Player 2.2.0 is vulnerable to a buffer overflow vulnerability when a specially crafted WMA file is opened and played. This can lead to a crash of the application and potentially allow arbitrary code execution.
A denial of service vulnerability exists in Safari Apple 4.0.5 when a large number of <object> tags are used. This can cause the application to crash due to a memory corruption issue in JavaScriptCore.dll.
A SQL injection vulnerability exists in Uiga Fan Club, which allows an attacker to execute arbitrary SQL commands on the underlying database. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. The vulnerable parameter is ‘id’, which is not properly sanitized before being used in a SQL query. This can be exploited to inject arbitrary SQL commands which can be used to bypass authentication, access, modify or delete data.
CMS Openpage is vulnerable to a SQL injection vulnerability. An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable parameter 'index.php?pagina=news&id='. This can allow the attacker to gain access to the database and extract sensitive information such as usernames, passwords, and emails.
Mini CMS RibaFS 1.0 is vulnerable to an authentication bypass vulnerability due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability to bypass authentication and gain access to the application. The vulnerability exists in the login.php file, where the application does not properly sanitize user-supplied input before using it in an SQL query. This can be exploited to inject arbitrary SQL code and bypass authentication.
Kenward zipper is vulnerable to a stack buffer overflow vulnerability. The vulnerability is caused due to a boundary error when handling a specially crafted ZIP file. This can be exploited to cause a stack-based buffer overflow by e.g. enticing a user to open a specially crafted ZIP file. Successful exploitation may allow execution of arbitrary code.
4x cms <= r26 is vulnerable to an authentication bypass vulnerability due to improper sanitization of user-supplied input. An attacker can exploit this vulnerability to bypass authentication and gain access to the application. The PoC for this vulnerability is to use ' or '1=1 as the username and password when logging in.