Joomla! Component AllVideos Reloaded 1.2.x is vulnerable to a SQL injection vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to execute arbitrary SQL commands on the underlying database, potentially allowing them to access or modify sensitive data.
AIST is implemented as a component for the content management system CMS Joomla! 1.5. and is a subsystem of the website of the center (service) to promote the employment of graduates or an educational institution. An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable parameter 'id' in the 'index.php' script. This can allow the attacker to access sensitive information from the database.
A SQL injection vulnerability exists in Joomla! Component Advertisement Board 3.1.0. An attacker can send a specially crafted HTTP request to the vulnerable application in order to execute arbitrary SQL commands in the back-end database. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code in the affected parameter. This can be exploited to disclose the contents of the back-end database.
Kubik-Rubik Simple Image Gallery Extended (SIGE) contains an XSS in the 'print.php' file. Insufficient sanitization of the 'caption' URL parameter allows injection of Javascript into the page. In versions <= 3.2.0 the 'name' and 'img' parameters are vulnerable as well.
Unsanitized input passed to removePermission parameter.
With this exploit,attacker can login as any user without any authentication.
The MyChart software contains an X-Path injection due to the lack of sanitization for the GE parameter 'topic'. A remote attacker can access contents of an XML document containing static display strings, such as field labels, via the topic parameter to help.asp.
A race condition allows local users to change ownership of arbitrary files (CVE-2015-3315). This module uses a symlink attack on '/var/tmp/abrt/*/maps' to change the ownership of /etc/passwd, then adds a new user with UID=0 GID=0 to gain root privileges. Winning the race could take a few minutes.
A vulnerability in Microsoft Edge's JIT process allows an attacker to execute arbitrary native code in the content process. This is achieved by predicting the address on which the JIT process will call VirtualAllocEx() and then allocating a writable memory region on the same address and writing an executable payload there. When the JIT process calls VirtualAllocEx(), the memory protection is set to PAGE_EXECUTE_READ.
The variable "captures_length" can be controlled by the user, so an integer overflow may occur at (a) which causes a heap overflow at (b).