EverSync 0.5 is vulnerable to arbitrary file download. An attacker can download the database file (db.sq3) by sending a GET request to the vulnerable URL.
This exploit allows an attacker to execute arbitrary code on a vulnerable server by using the IMAP protocol. The exploit uses the ProxyCommand option of the IMAP protocol to execute a base64 encoded command. The command is decoded and executed on the server.
Galaxy Forces MMORPG 0.5.8 is vulnerable to 'type' SQL Injection. An attacker can send a specially crafted HTTP request to the vulnerable application in order to execute arbitrary SQL commands in the back-end database. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code in the 'type' parameter of the 'ads.php' script.
Net-Billetterie 2.9 is vulnerable to SQL Injection. This vulnerability exists due to insufficient sanitization of user-supplied input in the 'login.inc.php' script. An attacker can exploit this vulnerability to gain access to the application and execute arbitrary SQL commands in the back-end database.
BitZoom 1.0 is vulnerable to SQL Injection. An attacker can send a specially crafted HTTP request to the vulnerable application in order to execute arbitrary SQL commands in the back-end database. This can be exploited to manipulate the data in the database, disclose sensitive information, or even gain access to the underlying system.
Precurio Intranet Portal 2.0 is vulnerable to Cross-Site Request Forgery (CSRF) which allows an attacker to add an admin user to the portal. An attacker can craft a malicious request to add an admin user to the portal. The malicious request can be sent to the victim via email, chat, etc. When the victim clicks on the malicious link, the attacker can add an admin user to the portal.
DoceboLMS 1.2 is vulnerable to SQL Injection and Arbitrary File Upload. An attacker can exploit these vulnerabilities to gain access to the system and execute malicious code.
When a user signs up for an account on the following url: Electricks-shop/pages/user_signup.php, the contact info input field isn't validated before displaying it to the admin control panel page where the script will be executed. For testing, an admin can register at /Electricks-shop/pages/admin_signup.php by sending a POST request with a malicious script in the contact field.
Pedidos 1.0 is vulnerable to SQL injection. An attacker can send a malicious SQL query to the web application which can be used to bypass authentication, access, modify and delete data in the back-end database.
Rmedia SMS 1.0 is vulnerable to SQL Injection. An attacker can exploit this vulnerability to extract sensitive information from the database. This can be done by sending a specially crafted HTTP request to the vulnerable application. The request contains a malicious SQL query that will extract information from the database.