Uiga Business Portal is vulnerable to SQL Injection and XSS. An attacker can inject malicious SQL queries into the application to gain access to the database. An attacker can also inject malicious HTML and JavaScript code into the application using the comment box.
Rostermain version 1.1 is vulnerable to an authentication bypass vulnerability due to improper sanitization of user input. An attacker can exploit this vulnerability by providing a crafted username and password in the login form. The crafted username and password should be ' or' 1=1. This will bypass the authentication and allow the attacker to access the application.
EncapsCMS version 0.3.6 and below is vulnerable to a remote file include vulnerability. This vulnerability is due to a lack of sanitization of user input in the 'common_foot.php' file. An attacker can exploit this vulnerability by sending a malicious payload to the 'config[path]' parameter in the 'common_foot.php' file. This can allow an attacker to execute arbitrary code on the vulnerable system.
Killmonster version 2.1 and below is vulnerable to an authentication bypass vulnerability due to improper sanitization of user-supplied input. An attacker can exploit this vulnerability by supplying a crafted username and password to the login page, bypassing authentication and gaining access to the application.
Croogo blog script lacks of cross site request forgery protection, allowing us to make exploit to add new admin user or change existing admin password.
This vulnerability allows an attacker to inject malicious SQL queries into the vulnerable web application. The vulnerable parameter is the "id" parameter in the "com_productbook" component of Joomla. By manipulating the "id" parameter, an attacker can inject malicious SQL queries into the application. The malicious SQL query in this exploit is "UNION all SELECT 1,2,3,concat(username,0x3a,password,0x3a,email),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58+from+condev.jos_users--" which allows an attacker to extract usernames, passwords, and emails from the database.
This exploit is for the UCODE_GET_VERSION ioctl NULL pointer dereference vulnerability on Solaris/OpenSolaris. This vulnerability was discovered by Tobias Klein and was detailed in the Trapkit advisory TKADV2010-001.txt and the NVD CVE-2010-0453. This exploit is written in C and is designed to cause a kernel panic.
Belkatalog CMS is comercial cms developed by croatian developer J. K. "Gašo" and it is vulnerable to sql injection vulnerability. An attacker can inject malicious SQL queries via the 'id' and 'lnk' parameters in the 'index.php' script. For example, http://server/index.php?id=m&lnk=-9999+union+all+select+1,version(),3,4,5,6--
Exponent CMS 0.96.3 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. The malicious request contains a specially crafted SQL query in the 'id' parameter of the 'view_article' action of the 'articlemodule' module. This can allow an attacker to gain access to sensitive information such as usernames and passwords stored in the database.
DA Mailing List System V2 is vulnerable to a Remote Admin Login and Download files vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. This will allow the attacker to gain access to the admin panel and download files from the server.