An Attackers are able to completely takeover the web application using RSS News - AutoPilot Script as they can gain access to the admin panel and manage the website as an admin. Steps to Reproduce: Step 1: Add: http://victim-site.com/admin/login.php in a rule list on No-Redirect Extension. Step 2: Access: http://victim-site.com/admin/index.php Step 3: Bypassed.
Hotspot Shield installs as a service with an unquoted service path. To properly exploit this vulnerability, the local attacker must insert an executable file in the path of the service. Upon service restart or system reboot, the malicious code will be run with elevated privileges.
A stored XSS vulnerability exists in Colorful Blog, which allows an attacker to inject malicious JavaScript code into the 'adsoyad' parameter of the 'single.php' page. By sending a crafted POST request with the malicious payload, an attacker can execute arbitrary JavaScript code in the victim's browser.
IObit Malware Fighter installs two service with an unquoted service path. To properly exploit this vulnerability, the local attacker must insert an executable file in the path of the service. Upon service restart or system reboot, the malicious code will be run with elevated privileges.
The vulnerability exists due to a boundary error when processing .pls files. A specially crafted .pls file can cause a buffer overflow, resulting in a crash of the application. This can be exploited to execute arbitrary code by enticing a user to open a malicious .pls file.
The application suffers from an unquoted service path issue impacting the service 'ATKGFNEXSrv (GFNEXSrv.exe)' deployed as part of ATKGFNEX. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with system privileges.
The application suffers from an unquoted service path issue impacting the service 'ASUS InstantOn (InsOnSrv.exe)' deployed as part of Asus InstantOn. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with system privileges.
An SQL injection vulnerability exists in Thatware 0.4.6 in the friend.php file. The vulnerable parameter is $sid, which can be exploited to execute arbitrary SQL commands.
The application suffers from an unquoted service path issue impacting the service 'ASLDRService' deployed as part of ATK Hotkey. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with system privileges on the system.
This vulnerability is in admin.php file when we want to edit a post or edit a categorie and..., with id parameter can show sql injection. A simple inject: Payload: '+order+by+999--+ http://simpleblogphp.com/blog/admin.php?act=editPost&id=1'+order+by+999--+ In response can see result: Could not execute MySQL query: SELECT * FROM blog_posts WHERE id='' order by 999-- ' . Error: Unknown column '999' in 'order clause' Result of payload: Error: Unknown column '999' in 'order clause'