ABB Cylon Aspect 3.07.02 suffers from a weak password policy in userManagement.php, allowing users to set simple or empty passwords and usernames without constraints. This flaw decreases account security, empowering attackers to misuse weak credentials for unauthorized access.
The OpenPanel File Manager version 0.3.4 is vulnerable to a directory traversal exploit. By sending a crafted GET request to view_file with the filename parameter set to 'shadow' and path_param set to '/etc', an attacker can access sensitive system files outside the intended directory. This vulnerability has been assigned CVE-2024-53582.
The Hunk Companion plugin version 1.9.0 is vulnerable to unauthenticated plugin installation due to a flaw in the permission_callback for the /wp-json/hc/v1/themehunk-import endpoint. This vulnerability allows unauthorized attackers to install and activate any plugin from the WordPress.org repository.
The exploit involves creating a malicious Windows theme file that contains a link to an attacker-controlled SMB server. When the victim opens this theme file, their NTLM hash is captured by the attacker. This vulnerability is identified as CVE-2024-21320.
The PZ Frontend Manager WordPress Plugin version 1.0.5 and below is vulnerable to Cross Site Request Forgery (CSRF) attacks due to lack of CSRF checks in certain areas. This could allow malicious actors to manipulate logged in users into executing unintended actions.
NagVis version 1.9.33 is vulnerable to an arbitrary file read exploit. An attacker can read arbitrary files on the system by sending a crafted request to the '/nagvis/server/core/ajax_handler.php' endpoint with a file path parameter. This vulnerability has been assigned CVE-2022-46945.
The ABB Cylon Aspect 3.08.02 allows attackers to perform unauthorized actions with administrative privileges by sending malicious HTTP requests to the userManagement.php script. This vulnerability exists due to the lack of proper validation checks on incoming requests, enabling attackers to exploit the system through a logged-in user visiting a malicious website.
The Tatsu wordpress plugin version 3.3.11 and below is vulnerable to unauthenticated remote code execution. An attacker can exploit this vulnerability to execute arbitrary code on the target system. This vulnerability is identified as CVE-2021-25094.
XWiki Platform is vulnerable to a critical Remote Code Execution (RCE) vulnerability that allows guest users to execute arbitrary code remotely via the SolrSearch endpoint. This can result in a complete server compromise, granting the attacker the ability to run commands on the underlying system, impacting the confidentiality, integrity, and availability of the XWiki installation. The issue has been addressed in XWiki versions 15.10.11, 16.4.1, and 16.5.0RC1.
MoziloCMS version 3.0 has an arbitrary file upload vulnerability in '/admin/index.php'. An authenticated attacker can upload a malicious .JPG file, rename it to .PHP using the application's function, leading to arbitrary code execution on the 'Files' session.