There is directory traversal vulnerability in the Share. Exploit Testing involves using FTP to connect to the server and using the 'get' command to traverse the directory structure and access sensitive files such as the passwd and com.apple.conference.plist files.
This exploit is a denial of service attack against VicFTPS 5.0. It sends a malicious LIST command to the FTP server, causing it to crash. The exploit was written in Python and tested on Windows XP SP3.
There is directory traversal vulnerability in the myDBLite. Exploit Testing involves connecting to the FTP server and using the 'cd ../../../../../../' command to traverse the directory structure.
There is directory traversal vulnerability in the iDocManager. Exploit Testing involves using FTP to connect to the server and using the 'get' command to traverse the directory and access the passwd and com.apple.conference.plist files.
There is directory traversal vulnerability in the Filer Lite. Exploit Testing involves using FTP to connect to the server and using the 'get' command to traverse directories and access sensitive files such as /etc/passwd and /private/var/mobile/Library/Preferences/com.apple.conference.plist.
There is directory traversal vulnerability in the Air Files. Exploit Testing involves using FTP to connect to the device and using the 'get' command to traverse the directory structure and access sensitive files such as the passwd and com.apple.conference.plist files.
Alcassoft's SOPHIA CMS is vulnerable to SQL injection. An attacker can inject malicious SQL queries into the vulnerable parameter 'pageid' in the 'dsp_page.cfm' script. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation of this vulnerability can result in the compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
VidiScript is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
A local file inclusion vulnerability in Course MS 2.1 can be exploited to include arbitrary files.
An arbitrary upload vulnerability in ProQuiz V2 can be exploited to upload a PHP shell.