The Saflok KDF vulnerability allows an attacker to derive keys by exploiting a weakness in the key derivation function. This can lead to unauthorized access and compromise of the system. This vulnerability does not have a CVE assigned yet.
The vulnerability in TitanNit Web Control 2.01 / Atemio 7600 allows an unauthorized attacker to execute system commands with elevated privileges by utilizing the 'getcommand' query in the application, resulting in root access.
The exploit involves creating a new process in Linux x86_64 by utilizing the execve() system call with an argument of /bin//sh. The shellcode is XOR encrypted, with the encrypted value being QWORD size (/bin - //sh). The assembly code uses XOR operations to set up the arguments for execve() and then executes the system call. The C code snippet demonstrates the execution of the shellcode from the stack.
The vulnerability in Microsoft Windows PowerShell allows for code execution bypassing single quotes using the semicolon ';' and ampersand '&' characters in filenames. By exploiting this flaw, arbitrary code execution can be triggered, and the PowerShell event log can be truncated.
The GYM Management System version 1.0 is vulnerable to stored cross-site scripting (XSS) due to insufficient validation of user-supplied data in the 'lname' field of the profile.php page. An attacker can inject a malicious payload, such as x%22%20onmouseover%3Dalert%28document.cookie%29%20x%3D%22, which will be executed whenever a user accesses the profile.php page, leading to the execution of arbitrary scripts in the context of the user's browser. This vulnerability has been detected by Alperen Yozgat.
The exploit allows an attacker to inject arbitrary code into a client's game, leading to potential unauthorized activities. The code author disclaims any liability for damages resulting from the exploit's usage.
The elFinder Web file manager version 2.1.53 allows remote attackers to execute arbitrary commands via an admin panel URL, which can lead to sensitive information disclosure. An attacker can upload a malicious PHP file to the target server and execute system commands, as demonstrated by accessing the /etc/passwd file.
An unauthenticated user can exploit the /pms/users.php endpoint to upload a malicious PHP file as a profile picture without authentication. This can lead to remote code execution on the server.
The SureMDM On-premise version 6.31 and below allows attackers to bypass CAPTCHA protection by enumerating valid user IDs, potentially leading to unauthorized access. This vulnerability has been assigned CVE-2023-3897.
CSZ CMS Version 1.3.0 allows remote attackers to execute arbitrary commands via a crafted request. This vulnerability has a CVE ID of CVE-2023-XXXX.