header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Share v1.0 for iPhone / iPod touch, Directory Traversal

There is directory traversal vulnerability in the Share. Exploit Testing involves using FTP to connect to the server and using the 'get' command to traverse the directory structure and access sensitive files such as the passwd and com.apple.conference.plist files.

iDocManager v1.0.0 for iPhone / iPod touch, Directory Traversal

There is directory traversal vulnerability in the iDocManager. Exploit Testing involves using FTP to connect to the server and using the 'get' command to traverse the directory and access the passwd and com.apple.conference.plist files.

Filer Lite v2.1.0 for iPhone / iPod touch, Directory Traversal

There is directory traversal vulnerability in the Filer Lite. Exploit Testing involves using FTP to connect to the server and using the 'get' command to traverse directories and access sensitive files such as /etc/passwd and /private/var/mobile/Library/Preferences/com.apple.conference.plist.

Air Files v2.6 for iPhone / iPod touch, Directory Traversal

There is directory traversal vulnerability in the Air Files. Exploit Testing involves using FTP to connect to the device and using the 'get' command to traverse the directory structure and access sensitive files such as the passwd and com.apple.conference.plist files.

Alcassoft’s SOPHIA CMS Vulnerable to SQL Injection

Alcassoft's SOPHIA CMS is vulnerable to SQL injection. An attacker can inject malicious SQL queries into the vulnerable parameter 'pageid' in the 'dsp_page.cfm' script. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation of this vulnerability can result in the compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

VidiScript Sql Injection Vulnerability

VidiScript is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Recent Exploits: