If the attacker has taken over the system and the taken user has write privileges to the "C:Program FilesActiveFax" folder or "C:"
Time Base SQL Injection payloads: http://example.com/rms/delete-order.php?id=1'or+sleep(5)%3b%23 and http://example.com/rms/delete-order.php?id=122'+and+(select+1+from+(select(sleep(3)))calf)--+
The malicious user can exploit the victim's PC remotely. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.
Adobe Connect versions 11.4.5 (and earlier), 12.1.5 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to impact the integrity of a minor feature. Exploitation of this issue does not require user interaction.
Altenergy Power Control Software C1.2.5 is vulnerable to OS command injection. An attacker can exploit this vulnerability by sending a maliciously crafted request to the target server. This can allow the attacker to execute arbitrary commands on the target system.
Wondershare Dr Fone version 12.9.6 running services named 'WsDrvInst' on Windows have weak service permissions and are susceptible to local privilege escalation vulnerability. Weak service permissions run with system user permission, allowing a standard user/domain user to elevate to administrator privilege upon successfully modifying the service or replacing the affected executable. DriverInstall.exe gave modification permission to any authenticated users in the windows operating system, allowing standard users to modify the service and leading to Privilege Escalation.
A vulnerability exists in Snitz Forum v1.0 which allows an attacker to perform a Blind SQL Injection attack. This can be exploited by sending a specially crafted HTTP request to the vulnerable application. This can result in the attacker gaining access to sensitive information from the database.
Attacker can use dorks to find the panel and send a request to the panel. If the response contains the passwords, the attacker can crack the hashes using John the Ripper. Most of the panels have the default password as 'admin'.
Attacker can using these dorks and access to the panel without password: inurl:/cgi-bin/scada-vis/, inurl:/scada-vis/schedulers, inurl:/cgi-bin/scada-vis/index.cgi, inurl:/scada-vis, inurl:/cgi-bin/scada-vis/touch.html. Attacker can these this dork for bruteforce the panel: inurl:/scada-vis/pin?return=index.
The endpoint /EventAttendance.php is vulnerable to Authenticated SQL Injection (Union-based and Blind-based) via the Event GET parameter. This endpoint can be triggered through the following menu: Events - Event Attendance Reports - Church Service/Sunday School. The Event Parameter is taken directly from the query string and passed into the SQL query without any sanitization or input escaping. This allows the attacker to inject malicious Event payloads to execute the malicious SQL query.