The PodcastGenerator application version 3.2.9 is vulnerable to blind SSRF via XML Injection. An attacker can inject malicious XML code in the Short Description section, leading to server-side request forgery (SSRF) attacks. By exploiting this vulnerability, an attacker can make arbitrary requests to internal resources or perform port scanning.
The Alkacon OpenCMS version 15.0 is vulnerable to multiple cross-site scripting (XSS) attacks. An attacker can exploit these vulnerabilities by injecting malicious scripts into various parameters and fields, leading to the execution of arbitrary code in the context of the user's browser.
Uploading a malicious SVG file in Prestashop 8.0.4 allows for a stored XSS attack. By uploading a specially crafted SVG file containing malicious script, an attacker can execute arbitrary JavaScript code in the context of the victim's browser.
The Vacation Rental 1.8 software is vulnerable to stored cross-site scripting (XSS). The vulnerability exists in the 'username', 'title', and 'comment' parameters of the POST request. An attacker can inject malicious scripts into these parameters, which will be executed in the context of the victim's browser when they visit the affected page or the reviews page. This allows the attacker to manipulate the content of the site and potentially perform further attacks.
This exploit triggers a buffer overflow vulnerability in TP-Link TL-WR940N V4 routers. By sending a crafted payload to the vulnerable endpoint, an attacker can cause a buffer overflow, potentially leading to remote code execution or denial of service. The vulnerability is identified by CVE-2023-36355.
The WP AutoComplete Search WordPress plugin through 1.0.4 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX available to unauthenticated users, leading to an unauthenticated SQL injection.
The attacker can send a link containing a malicious URL to a victim, which can perform actions such as stealing the victim's session token or login credentials. It also allows the attacker to inject malicious code into the website, giving them the ability to steal sensitive information, manipulate data, and launch additional attacks.
Allow Attacker to inject malicious code into website, give ability to steal sensitive information, manipulate data, and launch additional attacks.
The malicious user can upload a malicious SVG file which file is not filtered by a security function, and he can trick the administrator of this system to check his logo by clicking on him and visiting, maybe a very dangerous URL. Wrong web app website logic, and not well sanitizing upload function.
Unauthenticated access to settings or unauthenticated configuration download vulnerability in D-Link DAP-1325 allows the download of user settings without proper authentication.