The Bosch Video Recorder 630/650/670 Series is prone to multiple vulnerabilities. An attacker can gain root shell access by sending a specially crafted POST request to the /Net_work.xml file.
There are two vulnerabilities affecting Epicor Enterprise version 7.4. The first vulnerability, CVE-2014-4311, allows for password values to be accessed by observing the HTML code. The affected password values are 'Database Connection' and 'E-mail Connection'. The second vulnerability, CVE-2014-4312, allows for persistent and reflective cross-site scripting (XSS) attacks. This vulnerability allows for script injection and can result in abnormal behavior of the application.
Invalid include_once function at include/inc_checkdate_lang.php allows remote attackers to include arbitrary PHP files via a crafted root_path parameter.
The vulnerability resides in the register_form_complete hook, and some other hooks. The POST/GET data is not sanitized before being used in queries.
Invalid include function at ressourcen/dbopen.php
The HP Insight Diagnostics Online Edition is vulnerable to multiple cross-site scripting (XSS) vulnerabilities. These vulnerabilities occur due to improper sanitization of user-supplied input. An attacker can exploit these vulnerabilities to execute arbitrary script code in the browser of an unsuspecting user, potentially leading to the theft of authentication credentials and other attacks.
This exploit allows attackers to execute arbitrary code by enticing a legitimate user to compile a file from a network share location that contains a specially crafted executable file.
The WORK system e-commerce PHP application is vulnerable to an inclusion vulnerability. The vulnerable script is 'include_top.php', which is part of the content management system (CMS) for e-commerce. The vulnerability allows an attacker to include arbitrary files by manipulating the 'g_include' parameter in the URL. An example proof-of-concept (PoC) URL is provided in the text. The vulnerability can be exploited to execute malicious code or disclose sensitive information.
The response is broken into buffers, either at length 1024, or at 'rn'. Each buffer is appended with x00, without bounds checking. If the response is exactly 1024 characters in length, you will overflow the heap with the string x00.
The Grafik CMS is prone to an SQL-injection vulnerability and multiple cross-site scripting vulnerabilities due to inadequate sanitization of user-supplied input. Exploiting these vulnerabilities could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.