The GLPI Cartography Plugin version 6.0.0 is vulnerable to unauthenticated remote code execution. By sending a specially crafted HTTP POST request to the 'upload.php' file, an attacker can execute arbitrary code on the target system. This vulnerability has been assigned CVE-2022-34128.
The GLPI Activity plugin version 3.1.0 and earlier is vulnerable to an authenticated local file inclusion vulnerability. An attacker can exploit this vulnerability to read arbitrary files from the target system.
The GLPI Glpiinventory plugin version 1.0.1 is vulnerable to unauthenticated local file inclusion. An attacker can exploit this vulnerability to read arbitrary files from the server.
The GLPI Manageentities plugin version 4.0.2 and below is vulnerable to unauthenticated local file inclusion. An attacker can exploit this vulnerability by sending a specially crafted request to the `cri.class.php` file, allowing them to access arbitrary files on the system.
The Roxy WI v6.1.1.0 application is vulnerable to unauthenticated remote code execution (RCE) via ssl_cert upload. An attacker can exploit this vulnerability by uploading a malicious ssl_cert file, which can lead to remote code execution.
The Roxy WI version 6.1.0.0 and below are vulnerable to unauthenticated remote code execution (RCE). An attacker can exploit this vulnerability to execute arbitrary code without authentication.
An SQL injection vulnerability exists in Art Gallery Management System Project v1.0. By inserting a single quote (') or a double single quote ('') in the 'cid' parameter, an attacker can manipulate the SQL query and gain unauthorized access to the database.
This exploit allows an attacker to inject malicious code into a web application, which is then executed by the victim's browser. In this specific case, the vulnerability exists in the 'artname' parameter of the 'product.php' page. By inserting a crafted XSS payload, an attacker can trigger the execution of arbitrary JavaScript code on the victim's browser.
The 'Service MSExchangeADTopology' in Microsoft Exchange Active Directory Topology version 15.02.1118.007 has an unquoted service path vulnerability. This allows an attacker with local access to escalate privileges by placing a malicious executable in a directory higher in the search order than the legitimate executable.
LookStrike Lan Manager v0.9 has a remote/local file inclusion vulnerability in multiple files. These files include: modulesclassTable.php, modulesclassdbdb_admins.php, modulesclassdbdb_alert.php, modulesclassdbdb_double.php, modulesclassdbdb_games.php, modulesclassdbdb_matches.php, modulesclassdbdb_match_teams.php, modulesclassdbdb_news.php, modulesclassdbdb_platform.php, modulesclassdbdb_players.php, modulesclassdbdb_server_group.php, modulesclassdbdb_server_ip.php, modulesclassdbdb_teams.php, modulesclassdbdb_team_players.php, modulesclassdbdb_tournaments.php, modulesclassdbdb_tournament_teams.php, modulesclassdbdb_trees.php, modulesclasstournamentMatch.php, modulesclasstournamentMatchTeam.php, modulesclasstournamentRule.php, modulesclasstournamentRuleBuilder.php, modulesclasstournamentRulePool.php, modulesclasstournamentRuleSingle.php, modulesclasstournamentRuleTree.php, modulesclasstournamentTournament.php, modulesclasstournamentTournamentTeam.php, modulesclasstournamentTree.php, and modulesclasstournamentTreeSingle.php. These files can be exploited using the variable "sys_conf[path][real]".