A vulnerability in the WIMAX SWC-5100W Firmware V(1.11.0.1 :1.9.9.4) allows an authenticated user to execute arbitrary code on the device. The vulnerability exists due to insufficient input validation in the cgi-bin/diagnostic.cgi script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable device. Successful exploitation of this vulnerability could lead to remote code execution.
Due to the use of Access-Control-Allow-Origin: * on the 'Remote' upload endpoint used by Unified Remote Desktop, any internet originating webpage can make requests in the user's browser to the localhost endpoint to upload a crafted Remote zip file blob. This contains a remote.lua file which will be loaded and executed in the context of the current user. The below script will automatically update the executing command and host the payload delivery webpage which can be sent to target users or included in site pages as part of social engineering.
A Directory Traversal vulnerability in the web conference component of Mitel MiCollab AWV before 8.1.2.4 and 9.x before 9.1.3 could allow an attacker to access arbitrary files from restricted directories of the server via a crafted URL, due to insufficient access validation. A successful exploit could allow an attacker to access sensitive information from the restricted directories
Lab Collector is a software written in PHP by Agilebio. Version v4.234 allows an authenticated user to execute os commands on the underlying operating system.
A command injection vulnerability exists in ProPump and Controls Osprey Pump Controller 1.0.1. An attacker can exploit this vulnerability by sending a specially crafted eventFileSelected request to the vulnerable application. This can allow the attacker to execute arbitrary commands on the underlying operating system.
ProPump and Controls, Inc. provides pumping systems and automated controls for golf courses and turf irrigation, municipal water and sewer, biogas, agricultural, and industrial markets. Osprey is a door-mounted, irrigation and landscape pump controller. The affected version is Software Build ID 20211018, Production 10/18/2021, Mirage App: MirageAppManager, Release [1.0.1], Mirage Model 1, RetroBoard II. The system navigation allows quick and easy access to all critical pump station information with no password protection unless requested by the customer. Easy to understand control terminology allows any qualified pump technician the ability to make basic changes without support.
ProPump and Controls Osprey Pump Controller version 1.0.1 is vulnerable to Cross-Site Request Forgery (CSRF) attacks. An attacker can craft a malicious web page or link that, when visited by an authenticated user, can perform arbitrary actions on behalf of the user. This can be used to modify the system configuration, change user passwords, or even shut down the system.
A vulnerability in Osprey Pump Controller v1.0.1 allows an attacker to bypass authentication and modify credentials. The affected version is Software Build ID 20211018, Production 10/18/2021 and Mirage App: MirageAppManager, Release [1.0.1] and Mirage Model 1, RetroBoard II. The vulnerability is due to lack of password protection unless requested by the customer. This allows an attacker to access and modify critical pump station information.
A reflected cross-site scripting (XSS) vulnerability exists in the Osprey Pump Controller v1.0.1 software due to insufficient sanitization of user-supplied input. An attacker can leverage this vulnerability to execute arbitrary HTML and script code in a user's browser session in the context of the affected site.
A vulnerability in ProPump and Controls' Osprey Pump Controller 1.0.1 allows an unauthenticated attacker to inject arbitrary commands into the userName parameter of the web application. This can be exploited to execute arbitrary commands with the privileges of the web server process.