ByALBAYX

36 exploits Active since Jan 2009
CVE-2009-0458 EXPLOITDB WORKING POC
Whole Hog Ware Support 1.x - SQL Injection
Multiple SQL injection vulnerabilities in admin/login_submit.php in Whole Hog Ware Support 1.x allow remote attackers to execute arbitrary SQL commands via (1) the uid parameter (aka Username field) or (2) the pwd parameter (aka Password field). NOTE: some of these details are obtained from third party information.
CVE-2009-0458 EXPLOITDB text WRITEUP
Whole Hog Ware Support 1.x - SQL Injection
Multiple SQL injection vulnerabilities in admin/login_submit.php in Whole Hog Ware Support 1.x allow remote attackers to execute arbitrary SQL commands via (1) the uid parameter (aka Username field) or (2) the pwd parameter (aka Password field). NOTE: some of these details are obtained from third party information.
CVE-2009-1748 EXPLOITDB text WRITEUP
Joost Horward Catviz - Path Traversal
Multiple directory traversal vulnerabilities in index.php in Catviz 0.4.0 Beta 1 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) webpages_form or (2) userman_form parameter.
CVE-2009-2142 EXPLOITDB text WORKING POC
Zip Store Chat 4.0-5.0 - SQL Injection
Multiple SQL injection vulnerabilities in admin/index.asp in Zip Store Chat 4.0 and 5.0 allow remote attackers to execute arbitrary SQL commands via the (1) login and (2) senha parameters.
CVE-2009-0459 EXPLOITDB text WORKING POC
Whole Hog Password Protect: Enhanced 1.x - SQL Injection
Multiple SQL injection vulnerabilities in admin/login_submit.php in Whole Hog Password Protect: Enhanced 1.x allow remote attackers to execute arbitrary SQL commands via (1) the uid parameter (aka Username field) or (2) the pwd parameter (aka Password field). NOTE: some of these details are obtained from third party information.
CVE-2009-0602 EXPLOITDB text WRITEUP
WikkiTikkiTavi 1.11 - RCE
Unrestricted file upload vulnerability in upload.php in WikkiTikkiTavi 1.11 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in img/.
CVE-2009-0459 EXPLOITDB text WRITEUP
Whole Hog Password Protect: Enhanced 1.x - SQL Injection
Multiple SQL injection vulnerabilities in admin/login_submit.php in Whole Hog Password Protect: Enhanced 1.x allow remote attackers to execute arbitrary SQL commands via (1) the uid parameter (aka Username field) or (2) the pwd parameter (aka Password field). NOTE: some of these details are obtained from third party information.
CVE-2009-1495 EXPLOITDB text WRITEUP
Webfileexplorer Web File Explorer - Access Control
Web File Explorer 3.1 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for data/db.mdb.
EIP-2026-112420 EXPLOITDB text WRITEUP
Star Articles 6.0 - Remote Contents Change
CVE-2009-1850 EXPLOITDB text WRITEUP
Benjamin Curtis Phpbugtracker - SQL Injection
SQL injection vulnerability in index.php in phpBugTracker 1.0.3 allows remote attackers to execute arbitrary SQL commands via the password parameter.
CVE-2009-4202 EXPLOITDB text WRITEUP
Omilen Photo Gallery <Beta 0.5 - Path Traversal
Directory traversal vulnerability in the Omilen Photo Gallery (com_omphotogallery) component Beta 0.5 for Joomla! allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the controller parameter to index.php.
CVE-2009-2239 EXPLOITDB python WORKING POC
Joomla Com Casiino Blackjack - SQL Injection
SQL injection vulnerability in the (1) casinobase (com_casinobase), (2) casino_blackjack (com_casino_blackjack), and (3) casino_videopoker (com_casino_videopoker) components 0.3.1 for Joomla! allows remote attackers to execute arbitrary SQL commands via the Itemid parameter to index.php.
CVE-2009-2100 EXPLOITDB text WRITEUP
JoomlaPraise Projectfork <2.0.10 - Path Traversal
Directory traversal vulnerability in the JoomlaPraise Projectfork (com_projectfork) component 2.0.10 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the section parameter to index.php.
EIP-2026-108258 EXPLOITDB text WORKING POC
Joomla! Component Com_Agora 3.0.0 RC1 - Arbitrary File Upload
CVE-2009-3053 EXPLOITDB text WRITEUP
Jvitals Com Agora - Path Traversal
Directory traversal vulnerability in the Agora (com_agora) component 3.0.0b for Joomla! allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the action parameter to the avatars page, reachable through index.php.
CVE-2009-1752 EXPLOITDB text WRITEUP
Exjune Office Message System - Access Control
exJune Office Message System 1 does not properly restrict access to (1) configure.asp and (2) addmessage2.asp, which allows remote attackers to gain privileges a direct request. NOTE: some of these details are obtained from third party information.
CVE-2009-1749 EXPLOITDB text WRITEUP
Joost Horward Catviz - XSS
Multiple cross-site scripting (XSS) vulnerabilities in index.php in Catviz 0.4.0 beta 1 allow remote attackers to inject arbitrary web script or HTML via the (1) userman_form and (2) webpages_form parameters.
CVE-2009-2606 EXPLOITDB python WORKING POC
ASP Football Pool 2.3 - Info Disclosure
ASP Football Pool 2.3 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file via a direct request for NFL.mdb.
EIP-2026-100478 EXPLOITDB text WORKING POC
PenPal 2.0 - Authentication Bypass
EIP-2026-100626 EXPLOITDB text WRITEUP
Web-Calendar Lite 1.0 - Authentication Bypass
CVE-2009-2024 EXPLOITDB text WRITEUP
ASP VT Auth 1.0 - Info Disclosure
Vlad Titarenko ASP VT Auth 1.0 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file and obtain usernames and passwords via a direct request for zHk8dEes3.txt.
CVE-2009-0281 EXPLOITDB text WORKING POC
WarHound Walking Club - SQL Injection
SQL injection vulnerability in login.aspx in WarHound Walking Club allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) password parameters.
EIP-2026-100557 EXPLOITDB text WRITEUP
SkyPortal WebLinks 0.12 - Contents Change
EIP-2026-100556 EXPLOITDB text WRITEUP
SkyPortal Picture Manager 0.11 - Contents Change
EIP-2026-100555 EXPLOITDB text WRITEUP
SkyPortal Downloads Manager 1.1 - Remote Contents Change