Apache Tomcat – AJP ‘Ghostcat’ File Read/Inclusion (Metasploit)
>> TAG: #remote exploit
Apache Tomcat – AJP ‘Ghostcat’ File Read/Inclusion (Metasploit)
DigitalPersona 5.1.0.656 ‘DpHostW’ – Unquoted Service Path
SAntivirus IC 10.0.21.61 – ‘SAntivirusIC’ Unquoted Service Path
IDT PC Audio 1.0.6425.0 – ‘STacSV’ Unquoted Service Path
OpenCart Theme Journal 3.1.0 – Sensitive Data Exposure
Water Billing System 1.0 – ‘username’ and ‘password’ parameters SQL Injection
WordPress Plugin Good LMS 2.1.4 – ‘id’ Unauthenticated SQL Injection
Customer Support System 1.0 – ‘description’ Stored XSS in The Admin Panel
Customer Support System 1.0 – Cross-Site Request Forgery
Customer Support System 1.0 – ‘username’ Authentication Bypass