Vulnerability occurred in form_id parameter of FormExpress Component in Postnuke /index.php?module=FormExpress&func=display_form&form_id=1' The Attacker could read content of the database via blind sql injection methods (like ascii(substring))
A SQL injection vulnerability exists in Preisschlacht Multi Liveshop System, which allows an attacker to execute arbitrary SQL commands via the 'seite' and 'aid' parameters in the 'index.php' script.
An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable parameter 'ID_NLE' of the 'com_include' component. An example of a malicious query is '-1 UNION SELECT concat(username,0x3a,password) FROM jos_users' which can be sent to the vulnerable parameter as 'http://127.0.0.1/index.php?option=com_include&lang=en_GB&Itemid=50&ID_NLE=-1 UNION SELECT concat(username,0x3a,password) FROM jos_users'
A script was created to delete the admin user through Cross Site Request Forgery (CSRF). An image tag was used to send a request to the server with the action parameter set to deleteuser and the id parameter set to the user ID. After execution, the page was refreshed and the added content was deleted automatically.
A vulnerability was found in the Admin module of Clan Tiger_CMS. An attacker can delete the News content by sending a malicious request to the targeted URL. After execution, the content is deleted automatically.
In order to trigger the vulnerability a user needs to load a crafted Banzhaf (.bnz) file. The vulnerability is caused by a stack buffer overflow, which can be triggered by loading a specially crafted Banzhaf (.bnz) file.
OSSIM is prone to a Arbitrary File Download vulnerability because the software fails to adequately sanitize user-supplied input. The file “download.php” in “/ossiminstall/repository/” directory suffers from an Arbitrary File Download vulnerability due to the missed input validation on the "file" parameter; in particular no validation is done on path traversal patterns.
A vulnerability in the phpscripte24 Auktionshaus Community Standart System allows an attacker to inject malicious SQL code into the http://server/auktion/auktion.php?id_auk=1+and+1=1+and+ascii (substring((SELECT password FROM fh_user+WHERE+iduser=1 LIMIT 0,1),1,1))>1 parameter, which can be used to extract sensitive information from the database.
A SQL injection vulnerability exists in Online Community CMS by I-net, which allows an attacker to execute arbitrary SQL commands via the 'blid', 'plid', 'vdoid', and 'mid' parameters in view-blog-full.php, mem-play-song-cnt.php, mem_videos-play-cnt.php, and profile.php respectively.
A vulnerability in the Joomla Component com_rwcards allows an attacker to perform a Local File Inclusion (LFI) attack. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'controller' parameter of the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with maliciously crafted 'controller' parameter. This can allow an attacker to read arbitrary files on the vulnerable system.