MotoCMS Version 3.4.3 Store Category Template was discovered to contain a Server-Side Template Injection (SSTI) vulnerability via the keyword parameter.
Using the REST-API of Pydio Cells it is possible to start jobs. For example, when renaming a file or folder an HTTP request similar to the following is sent: PUT /a/jobs/user/move HTTP/2 Host: example.com User-Agent: agent Accept: application/json Authorization: Bearer G4ZRN[...] Content-Type: application/json Content-Length: 140 { "JobName": "move", "JsonParameters": "{"nodes"":[""cell/file.txt""]
When a file named 'xss.html' is downloaded in the Pydio Cells web application, a download URL is generated. The URL contains a parameter 'response-content-disposition' which is set to 'attachment' causing the browser to download the file instead of interpreting it. The URL also contains a signature, expiry timestamp, and the user's JWT for authentication. The access key with the ID 'gateway' is referenced, which can be found in the JavaScript sources of Pydio Cells together with the secret.
This exploit allows an attacker to upload files to the Faculty Evaluation System 1.0 without authentication, potentially leading to remote code execution. The vulnerability exists in the login.php page, which does not properly validate user input.
The Online Security Guards Hiring System version 1.0 is vulnerable to a reflected XSS attack. This allows an attacker to execute malicious scripts in the victim's browser, potentially leading to unauthorized access or data theft.
This module triggers a Denial of Service vulnerability in the Flexense HTTP server. Vulnerability caused by a user mode write access memory violation and can be triggered with rapidly sending variety of HTTP requests with long HTTP header values. Multiple Flexense applications that are using Flexense HTTP server 10.6.24 and below vesions reportedly vulnerable.
The `email` parameter in SCRMS 2023-05-27 1.0 is vulnerable to SQL injection attacks. An attacker can exploit this vulnerability to steal user information, including passwords, from the system.
The Rukovoditel version 3.3.1 is vulnerable to CSV injection. By setting the Firstname field as '=calc|a!z|', an attacker can trigger a CSV injection attack and open the calculator on the admin's computer when the admin exports customers as a CSV file.
Camaleon CMS v2.7.0 was discovered to contain a Server-Side Template Injection (SSTI) vulnerability via the formats parameter.
The exploit allows an authenticated user to create a new user or group with a malicious payload that triggers a cross-site scripting vulnerability. This can lead to the execution of arbitrary code or the stealing of sensitive information.