The vulnerability exists in the iPhone4 FTP Server V1.0 application, which allows an attacker to remotely crash the application by sending an empty CWD command. This can be exploited by sending an empty CWD command to the FTP server running on port 2121.
Guru JustAnswer Professional 1.25 is vulnerable to multiple SQL injection vulnerabilities. An attacker can exploit these vulnerabilities to gain access to sensitive information stored in the database, such as user credentials, or to execute arbitrary SQL commands.
The router's web interface reveals the Administrator Password's MD5 Hash. Its even possbile to bypass the login completely.
This exploit allows an attacker to inject malicious SQL queries into the application. It can be used to gain access to sensitive information stored in the database.
There is a vulnerability in almost every file directory, for example in the system/default.php file, where a malicious user can exploit the require_once ($globalIncludeFilePath) statement to inject malicious code into the system.
In Puzzle App CMS there are couple of the places you will be able to find LFI vulns. The vulnerable source is include_once ($COREROOT . "config/loader.config.php"); and the sample to LFI is http://localhost/puzzle/core/config.loader.php?COREROOT=[LFI] and the PoC LFI is http://localhost/puzzle/core/config.loader.php?COREROOT=../../../boot.ini%00
Admin Login Bilgileri Alinabilir. Example Vuln: [+]/index.php?option=com_joomnik&album=[EXPLOIT] [+] Dork: "com_joomnik" [+] Demo: http://site.com/index.php?option=com_joomnik&album=6'
This exploit takes advantage of a Directory Path Traversal to execute ipconfig.exe on the remote host.
JMS FileSeller is vulnerable to a Local File Inclusion vulnerability. This vulnerability allows an attacker to include a file from the local file system of the server. The vulnerable parameter is 'view' and an example of the vulnerable URL is index.php?option=com_jmsfileseller&view=../../../etc/passwd%00&cat_id=12&Itemid=27
Guru Penny Auction Pro V3 is vulnerable to Blind SQL Injection. An attacker can exploit this vulnerability to gain access to sensitive information from the database. The vulnerable parameter is 'prodid' which can be manipulated to inject malicious SQL queries. An attacker can use the SUBSTRING() function to extract information from the database.