The RaidenFTPD 2.4.4005 software is vulnerable to a buffer overflow vulnerability. By sending a specially crafted payload, an attacker can trigger a stack-based buffer overflow, potentially allowing for remote code execution.
The Wifi Soft Unibox Administration 3.0 and 3.1 Login Page is vulnerable to SQL Injection, which can lead to unauthorized admin access for attackers. The vulnerability occurs because of not validating or sanitizing the user input in the username field of the login page and directly sending the input to the backend server and database.
The Microsoft Office 365 Version 18.2305.1222.0 app is vulnerable to Elevation of Privilege. The attacker can use this vulnerability to attach a very malicious WORD file in the Outlook app which is a part of Microsoft Office 365 and easily can trick the victim to click on it - opening it and executing a very dangerous shell command, in the background of the local PC. This execution is without downloading this malicious file, and this is a potential problem and a very dangerous case! This can be the end of the victim's PC, it depends on the scenario.
This module exploits an authenticated command injection vulnerability in the "restore_rrddata()" function of pfSense prior to version 2.7.0 which allows an authenticated attacker with the "WebCfg - Diagnostics: Backup & Restore" privilege to execute arbitrary operating system commands as the "root" user. This module has been tested successfully on version 2.6.0-RELEASE.
Some Hikvision Hybrid SAN products were vulnerable to multiple remote code execution vulnerabilities such as command injection, Blind SQL injection, HTTP request smuggling, and reflected cross-site scripting. This resulted in remote code execution that allows an adversary to execute arbitrary operating system commands and more. However, an adversary must be on the same network to leverage this vulnerability to execute arbitrary commands.
This exploit allows an authenticated user to access files outside of the intended directory structure on the TP-Link TL-WR740N router. By sending a specially crafted GET request, the attacker can traverse directories and access sensitive files such as the /etc/shadow file, which contains hashed passwords.
The Blackcat Cms v1.4 application is vulnerable to remote code execution (RCE) due to improper handling of user-supplied input. An attacker can upload a specially crafted ZIP file containing a malicious PHP file and execute arbitrary commands on the server.
The Blackcat CMS version 1.4 is vulnerable to stored cross-site scripting (XSS) attacks. An attacker can exploit this vulnerability by injecting malicious code into the application, which will be executed when the targeted user views the affected page.
This exploit allows an attacker to expose sensitive information in ABB FlowX v4.00. By sending a specific request, the attacker can retrieve user login information from the system.
The statamic-4.7.0 suffers from file inclusion - file upload vulnerability. The attacker can upload a malicious HTML file and can share the malicious URL which uses the infected HTML file to the other attackers in the network, they easily can look at the token session key and can do very dangerous stuff.