This exploit allows an attacker to gain access to the database of Cilem Haber v1.4.4 (Tr) by exploiting a vulnerability in the application. The exploit is written in Python and can be used to download the database from the vulnerable server.
The $_POST["login"] isn't sanitized before executing the database query. An attacker can use this for a blind SQL injection attack. An attacker can insert his/her own login credentials and test it with them or do it with benchmark() without a user-account. Aprox santizes the input, so you have to use the ascii() function.
Hanso Player version 1.3.0 is vulnerable to a Denial of Service attack when a specially crafted .m3u file is opened. The application crashes when a file containing 1337 bytes of 'A' characters is opened. This vulnerability can be exploited by an attacker to crash the application.
Cross site Scripting: http://Victim]/giris-hata.asp?returnURL=sepet.asp[Site SCRIPTING] http://Victim]/giris-hata.asp?returnURL=sepet.asp%22%3E%3Ch1%3Eh4x0reSEC%3C/h1%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E SQL Injection(MSACCESS): http://[Victim]/sayfa.asp?i=34' {Microsoft JET Database Engine error '80040e14' ~ SQL Injection : ON http://[Victim]/sayfa.asp?i=34[SQL Injection] http://[Victim]/sayfa.asp?i=34+and%201=1 {true} http://[Victim]/sayfa.asp?i=34+and%201=0 {false}
SmarterMail 7.x (7.2.3925) was released on 10/1/2010 and was to have addressed a number of issues identified in CVE's http://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-3425 and http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3486. I have identified a LDAP Injection + Cross Site Scripting (STORED) vulnerability in SmarterMail 7.x (7.2.3925).
A denial of service vulnerability exists in FileApp < v.2.0, iPad 3.2.2 (jailed) when a malicious user sends a large number of USER and PASS commands to the FTP server. This causes the server to crash and become unresponsive.
It is important for application developers to penetration test their products prior to release in order to find potential vulnerabilities and correct them before fraudsters exploit them. Server Application developers should explicitly be detailing the exploit surface modeling performed on an application as part of the software development lifecycle prior to and as part of a candidate release. System Admins need to take a trust-no-one approach when installing Server and Client Applications for wide-scale deployment.
I made a new attack techinque to exploit SafeSEH+SEHOP protection all at once after research SEH. And I applied the new method on AudioTran vulnerability for case by case exploit.
This exploit allows an attacker to download files from the Bka Haber v1.0 (Tr) web application. The exploit is written in Python and takes the URL of the web application as an argument. It then downloads all the files from the 'dosyalar/' directory of the web application.
iGaming CMS version 1.5 is vulnerable to Blind SQL Injection. This vulnerability allows an attacker to extract sensitive information from the database. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'id' parameter of the 'polls.class.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with malicious SQL statements to the vulnerable script. This can allow the attacker to extract sensitive information from the database, such as usernames and passwords.