The PodcastGenerator application version 3.2.9 is vulnerable to multiple instances of stored cross-site scripting (XSS). An attacker can exploit this vulnerability by uploading a malicious file with a crafted title, which will be executed when viewed in the 'View All Episodes' page. This allows an attacker to execute arbitrary JavaScript code in the context of the victim's browser.
Versions =< 10.0 of Trend Micro OfficeScan Client contain wrong ACL rights on the OfficeScan client folder, allowing attackers to escalate privileges to the system level through the services. This vulnerability does not require any privileged access.
The vulnerability allows an attacker to execute arbitrary code remotely in PaperCut NG/MG version 22.0.4. The exploit involves sending a specially crafted payload to the service 'direct/1/OptionsUserSync/$OptionsUserSource.$Form'. This allows the attacker to gain unauthorized access and execute commands on the affected system.
The WBiz Desk 1.2 application is vulnerable to SQL Injection. An attacker can exploit the 'ticket.php' page by injecting malicious SQL code into the 'tk' parameter, allowing them to execute arbitrary SQL queries.
This exploit allows an attacker to execute arbitrary code on the target system by exploiting a vulnerability in thrsrossi Millhouse-Project version 1.414. By sending a specially crafted request to the target's add_post_sql.php file, an attacker can upload a malicious PHP file and execute arbitrary commands on the target system.
The e107 version 2.3.2 is vulnerable to reflected cross-site scripting (XSS) attacks. An attacker can exploit this vulnerability by injecting malicious scripts into user-supplied input fields.
This exploit allows an attacker to perform unauthenticated SQL injection in PnPSCADA v2.x. By manipulating the 'userids' parameter in the 'hitlogcsv.isp' endpoint, an attacker can inject malicious SQL queries and potentially gain unauthorized access to the backend database.
This exploit allows an attacker to bypass authentication in Apache Superset version 2.0.0. The vulnerability is due to the insecure handling of session cookies, which can be forged by an attacker. By exploiting this vulnerability, an attacker can gain unauthorized access to the Superset instance without valid credentials. The exploit works by decoding the session cookie and forging a new session cookie for a specified user ID. This allows the attacker to impersonate the specified user and gain full access to the Superset instance.
The vulnerability allows an authenticated user to inject malicious code into the CMS by creating a new post with a specially crafted title.
The WordPress Plugin Backup Migration 1.2.8 allows unauthenticated users to access and download the database backup files. By exploiting this vulnerability, an attacker can gain unauthorized access to sensitive data.