Mulesoft ESB Runtime 3.5.1 allows any arbitrary authenticated user to create an administrator user due to a lack of permissions check in the handler/securityService.rpc endpoint. The following HTTP request can be made by any authenticated user, even those with a single role of Monitor. This request will create an administrator with all roles with a username of notadmin and a password of notpassword. Many vectors of remote code execution are available to an administrator. Not only can an administrator deploy WAR applications, they can also evaluate arbitrary groovy scripts via the web interface.
The Webdorado Spider Event Calendar plugin for WordPress version 1.4.9 is vulnerable to SQL Injection. This allows an attacker to execute arbitrary SQL queries, potentially gaining unauthorized access to the database.
The exploit allows arbitrary write privilege escalation in SoftSphere DefenseWall FW/IPS. It is discovered by Parvez Anwar. The vulnerability is found in version 3.24 of the software. The driver version is 3.2.3.0 - dwall.sys. The exploit is tested on 32-bit Windows XP SP3. The CVE ID for this vulnerability is CVE-2015-1515. There is no fix available for this vulnerability.
This vulnerability allows an attacker to escalate privileges by overwriting the HAL dispatch table. By controlling the input buffer, the attacker can overwrite pointers in the table, which can be used to execute arbitrary code or gain elevated privileges. The vulnerability was discovered by Parvez Anwar and affects multiple BullGuard products. The affected versions range from 14.1.285.4 to 15.0.288.1. The vulnerability has a CVE ID of CVE-2014-9642. The vendor has released a fix for this vulnerability, which can be found at the provided URL. The fixed version is 15.0.288.1. The exploit was tested on a 32-bit Windows XP SP3 system. The vulnerability can be mitigated by updating to the fixed version of the software.
The AVG Internet Security 2015 software allows an attacker to escalate privileges by overwriting the HAL dispatch table. By controlling the input buffer, the attacker can overwrite static pointers, leading to privilege escalation.
This exploit allows an attacker to escalate their privileges and write arbitrary data in McAfee Data Loss Prevention Endpoint. The vulnerability exists in the hdlpctrl.sys driver of the software. By exploiting this vulnerability, an attacker can gain elevated privileges and potentially execute arbitrary code on the target system.
The jclassifiedsmanager component is vulnerable to SQL Injection and XSS attacks. The 'id' parameter in the 'displayads' task is not sanitized, allowing an attacker to inject malicious SQL code. The 'view' parameter in the 'displayads' task is also not sanitized, allowing an attacker to inject arbitrary JavaScript code.
ecommercemajor is a php based CMS for ecommerce portal. It is vulnerable to SQL injection in the 'product.php' file where the 'productbycat' parameter is not properly filtered before being used in a SQL query. It is also vulnerable to authentication bypass in the 'index.php' file under the '__admin' directory, where the 'username' and 'password' parameters are not properly filtered before being used in a SQL query.
This exploit allows an attacker to upload files without authorization and execute remote code on the target system. The vulnerability exists in Cforms version 14.7 and has a CVE ID of 2014-9473. By exploiting this vulnerability, an attacker can upload malicious files and execute arbitrary code on the target system.
The WP Pixarbay Images plugin for Wordpress is affected by multiple vulnerabilities, including authentication bypass, arbitrary file upload, path traversal, and cross-site scripting (XSS). An attacker can exploit these vulnerabilities to execute arbitrary code, upload malicious files, and perform cross-site scripting attacks.