Test a web page's parameters trying to detect potential SQL Injection vulnerabilities.



The module can be configured to look for vulnerabilities in GET & POST parameters and cookies.



This update adds an additional trigger to the FAST set of SQL injection triggers for the SQL Injection analyzer to use.
The vulnerability exists within the QuickTimeVR.qtx component when processing a QTVRStringAtom having an overly large "stringLength" parameter. This can be exploited to cause a based buffer overflow and execute arbitrary code under the context of the user running the application.

This update adds support for Internet Explorer 6 and 8 and bypass DEP.

Also allows to send the mov file by email to open it directly with QuickTimePlayer.



The vulnerability is caused by scripts using "unserialize()" with user controlled input. This can be exploited to execute arbitrary PHP code via the "__destruct()" method of the "SugarTheme" class or passing an ad-hoc serialized object through the $_REQUEST['current_query_by_page'] input variable.