A SQL injection vulnerability exists in Joomla! Component vWishlist 1.0.1. An attacker can send a specially crafted HTTP request to the vulnerable application in order to execute arbitrary SQL commands in the back-end database. This can be exploited to manipulate or disclose arbitrary data in the back-end database.
A remote code execution vulnerability exists in Joomla! Component vBizz 1.0.7. An attacker can exploit this vulnerability by sending a specially crafted HTTP POST request to the vulnerable application. This can allow the attacker to execute arbitrary code on the vulnerable system.
This code exploits both CVE-2018-15708 and CVE-2018-15710 to pop a root reverse shell. It handles sending a get request, checking if a URL is ok, running a shell command using the PHP file uploaded, and deleting files locally and on the Nagios XI instance.
A vulnerability in Microsoft Windows allows an attacker to execute arbitrary code by manipulating the URL of a VCF or Contact file. This vulnerability affects Windows 7 SP1, 8.1, 10 v.1809 with full patches up to January 2019. both x86 and x64 architectures.
Joomla! Component Easy Shop 1.2.3 is vulnerable to Local File Inclusion. An attacker can exploit this vulnerability to read sensitive files from the server. This vulnerability exists due to insufficient sanitization of user-supplied input to the 'file' parameter of the 'index.php' script. An attacker can send a specially crafted HTTP request to the vulnerable script and read sensitive files from the server.
CloudMe Sync v1.11.2 is vulnerable to a buffer overflow vulnerability due to improper bounds checking of user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted payload to the vulnerable application. This can result in arbitrary code execution in the context of the application.
The failure allows any ordinary user to enter SQL Injection and take over the administrator account or any other user of the system, by editing the profile itself. The POC involves registering an ordinary user or using the framework standard, accessing the user profile and clicking edit, entering SQL injection in the field name and clicking save, and then going to the login screen and entering the username and password.
A buffer overflow vulnerability exists in Echo Mirage 3.1 (x64) when a maliciously crafted file is opened. An attacker can exploit this vulnerability to execute arbitrary code in the context of the current user. To exploit this vulnerability, an attacker must entice a user to open a maliciously crafted file. The maliciously crafted file must contain a buffer of 24241 A's, 8 B's and 50 C's.
A SQL injection vulnerability exists in PHP Uber-style GeoTracking 1.1. An attacker can send a specially crafted HTTP request to the vulnerable application in order to execute arbitrary SQL commands in the context of the application's database.
A Local File Inclusion (LFI) vulnerability exists in PHP Dashboards NEW 5.8, which allows an attacker to include a file from the local file system of the web server. An attacker can send a specially crafted HTTP request containing an arbitrary file name in the filename parameter to read.php, which will include the file in the output. This can be used to view sensitive files on the web server, such as the /etc/passwd file.