CSRF vulnerability was discovered in v4.0.5 version of Subrion CMS. With this vulnerability, authorized users can be added to the system.
Ricoh (IBM) InfoPrint 1532 devices allow Stored XSS via the 1.network.6.10 parameter to the cgi-bin/posttest/cgi-bin/dynamic/config/gen/general.html URI. (HTML Injection can also occur.)
Multiple Remote File Inclusion (RFI) and Local File Inclusion (LFI) vulnerabilities exist in TeamCal Pro version 3.1.000 and earlier. These vulnerabilities allow an attacker to include arbitrary remote or local files, potentially leading to remote code execution or information disclosure.
The SpotFTP FTP Password Recovery software version 3.0.0.0 is vulnerable to a denial of service attack. By providing a specially crafted input in the 'Key' field, an attacker can cause the software to crash, resulting in a denial of service condition.
Attacker can bypass login page and access the dashboard page by injecting the payload in the email and password fields.
The parameter 'doctorspecilization' in the Hospital Management System 4.0 is vulnerable to persistent and stored cross-site scripting (XSS) attacks. An attacker can inject malicious script code into the application, which will be executed whenever the vulnerable page is viewed.
The Hospital Management System 4.0 web application is vulnerable to SQL injection in multiple areas, specifically in the 'searchdata' parameter under the search feature in the doctor login.
This is an exploit for a stack overflow vulnerability in BadBlue 2.72. It allows an attacker to execute arbitrary code on the target system.
This exploit targets two vulnerabilities in FreeBSD-SA-19:15.mqueuefs and FreeBSD-SA-19:24.mqueu. It is a root exploit for FreeBSD mqueuefs vulnerabilities. The exploit involves modifying the libmap.conf file and creating temporary files during exploitation. It also utilizes specific cores and syscalls from mqueuefs.
The Joomla Component mosDirectory 2.3.2 is vulnerable to Remote File Inclusion. An attacker can exploit this vulnerability to include a remote file and execute arbitrary code on the target system.