Cross Site Scripting: An attacker can inject malicious JavaScript code into the vulnerable application. Cross Site Request Forgery: An attacker can add an admin user to the application. Local File disclure: An attacker can access sensitive files from the application.
Cross Site Request Forgery (CSRF) vulnerability in the Job Listing Script allows remote attackers to hijack the authentication of administrators for requests that change the username and password. Multiple Cross Site Scripting (XSS) vulnerabilities in the Job Listing Script allow remote attackers to inject arbitrary web script or HTML via the category_title parameter to index.php.
This exploit allows an attacker to add an admin user to the Auto Classifieds Script v2.0 by sending a malicious POST request. The request contains the full name, username, password, status and role_id of the admin user to be added.
I have been found remote code execution vulnerability in the SoapUI product, which allows me to execute a java code to the victim's computer via malicious WSDL/WADL file. This vulnerability allows attacker to execute java code to any client's machine that will use my WSDL file and will try to send request to the remote server. SoapUI allows the client execute code by entering a java code inside the following tag, the java code will be executed when the client will try to send request to the server: ${=JAVA CODE}; Thus, an attacker can make a malicious WSDL file, determine a malicious java code as default value in one of the requests parameters, hence, when client uses malicious WSDL file and will try to send a request the java code will be executed. The attack flow is: 1. The attacker makes a malicious web service with fake WSDL including the java payload that will be executed on the victim. 2. The victim enters the soapUI program and will enter the malicious WSDL address. 3. The victim decides to send a request to the server, and the java code executed on the victim's machine. 4. The attacker succeed execute java code in the victim's machine, and will take over it.
Feixun FWR-604H 150Mbps Wireless N Router is vulnerable to Remote Code Execution vulnerability(Hardware Version 1.0, Firmware Build: 7642, Vendor website:feixun.com.cn). The web server don't authenticate user prior to system level execution. As such an unauthenticated attacker can easily remotely exploit the target using system_command parameter in diagnosis.asp file.
A SQL injection vulnerability exists in DomPHP <= v0.83. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. This can allow the attacker to gain access to sensitive information such as usernames and passwords.
CUBIC CMS presents a full path disclosure in the 'Controller Not Found' exception management, due to an incorrect 'Software Exception' management. CUBIC CMS presents a SQL Injection in its 'resource_id' and 'version_id' parameters on his '/recursos/agent.php' (Resources Management Module) script via GET HTTP Method, due to an insufficient sanitization on user supplied data. CUBIC CMS presents a SQL Injection in its 'login' and 'pass' parameters on his '/login.usuario' (Users Management Module) script via POST HTTP Method, due to an insufficient sanitization on user supplied data. CUBIC CMS presents a SQL Injection in its 'path' parameter on his '/recursos/agent.php' (Resources Management Module) script via GET HTTP Method, due to an insufficient sanitization on user supplied data.
This module exploits a stack-based buffer overflow vulnerability in version 2.1 of IcoFX. The vulnerability exists while parsing .ICO files, where an specially crafted ICONDIR header, providing an arbitrary long number of images into the file, can be used to trigger the overflow when reading the ICONDIRENTRY structures.
vTiger CRM allows an user to bypass authentication when requesting SOAP services. In addition, arbitrary file upload is possible through the AddEmailAttachment SOAP service. By combining both vulnerabilities an attacker can upload and execute PHP code. This module has been tested successfully on vTiger CRM v5.4.0 over Ubuntu 10.04 and Windows 2003 SP2.
The vulnerability exists in the view.php file, where the classID parameter is not properly sanitized before being used in an SQL query. An attacker can exploit this vulnerability by sending a malicious SQL query to the application. The Cross Site Scripting vulnerability exists in the view.php file, where the class parameter is not properly sanitized before being used in an HTML output. An attacker can exploit this vulnerability by sending a malicious script to the application.