The Multi-Scheduler plugin 1.0.0 for WordPress has a Cross-Site Request Forgery (CSRF) vulnerability in the forms it presents, allowing the possibility of deleting records (users) when an ID is known.
A persistent cross-site scripting vulnerability exists within the 'Saved Searches' functionality of osTicket.
A persistent cross-site scripting vulnerability exists within the 'Ticket Queue' functionality of osTicket.
A stored cross-site scripting vulnerability exists within the 'Permission Roles' functionality of the LimeSurvey administration panel. The vulnerability is caused by the lack of proper input sanitization of the 'Permissiontemplates[name]' and 'Permissiontemplates[description]' parameters.
The Online Marriage Registration System suffers from multiple stored cross-site script vulnerabilities.
This exploit allows remote attackers to execute arbitrary code on the target system by bypassing the allowed file types and file type sanitization. It can upload a PHP file with a reverse shell and gain unauthorized access.
The Joomla! Plugin XCloner Backup 3.5.3 allows an authenticated user to include local files on the server by manipulating the 'file' parameter in the 'download' action of the 'admin.cloner.php' file. This can lead to unauthorized access and disclosure of sensitive information.
This module exploits a vulnerability found in Synology DiskStation Manager (DSM) versions < 5.2-5967-5, which allows the execution of arbitrary commands under root privileges after website authentication. The vulnerability is located in webman/modules/StorageManager/smart.cgi, which allows appending of a command to the device to be scanned. However, the command with drive is limited to 30 characters. A somewhat valid drive name is required, thus /dev/sd is used, even though it doesn't exist. To circumvent the character restriction, a wget input file is staged in /a, and executed to download our payload to /b. From there the payload is executed. A wfsdelay is required to give time for the payload to download, and the execution of it to run.
Unauthenticated remote code execution can be achieved by sending a serialized BadAttributeValueExpException object over the T3 protocol to vulnerable WebLogic servers.
This exploit targets the VUPlayer version 2.49 and takes advantage of a local buffer overflow vulnerability. It allows an attacker to execute arbitrary code on a vulnerable system. The exploit has been tested on Windows 7 Professional with ALSR and Full DEP turned ON.