The Perch CMS version 3.2 is vulnerable to a stored XSS attack. By uploading a specially crafted SVG file, an attacker can execute arbitrary JavaScript code in the context of the victim's browser.
This exploit allows remote code execution in Perch CMS v3.2. By uploading a specially crafted PHP file, an attacker can execute arbitrary commands on the target system.
Session tokens in RWS WorldServer have a low entropy and can be enumerated, leading to unauthorised access to user sessions.
The vulnerability laboratory core research team discovered multiple persistent cross site vulnerabilities in the PaulPrinting (v2018) cms web-application.
The vulnerability laboratory core research team discovered a local kiosk privilege escalation vulnerability in the operating system of the Aures Komet Booking & POS Terminal (Windows 10 IoT Enterprise) used by the german company immergrün franchise gmbh.
The vulnerability laboratory core research team discovered multiple persistent web vulnerabilities in the Webile v1.0.1 Wifi mobile android web application.
The vulnerability laboratory core research team discovered multiple web vulnerabilities in the official Dooblou WiFi File Explorer 1.13.3 mobile android wifi web-application.
A client-side cross site scripting vulnerability has been discovered in the official PaulPrinting (v2018) cms web-application. Remote attackers are able to manipulate client-side requests by injection of malicious script code.
Multiple html injection vulnerabilities have been discovered in the Active Super Shop Multi-vendor CMS v2.5 web-application. The web vulnerability allows remote attackers to inject their own html codes with a persistent vector to manipulate application content. The persistent html injection web vulnerabilities are located in the name, phone, and address parameters of the manage profile and products.
A persistent script code injection web vulnerability has been discovered in the official Boom CMS v8.0.7 web-application. The vulnerability allows remote atta...