Design Error in SAP BusinessObjects launch pad leads to SSRF attack. An attacker can use this vulnerability to scan internal networks and access sensitive information.
SysGauge Server 3.6.18 the Control Protocl suffers from a denial of service. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 9221.
The router suffers from an unauthenticated reboot command execution. Attackers can exploit this issue to cause a denial of service scenario.
The router suffers from authenticated arbitrary system command execution. The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.
The application suffers from multiple stored and reflected XSS vulnerabilities. The issues are triggered when an unauthorized input passed via multiple POST and GET parameters is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
Input passed thru the 'file' GET parameter in 'forceSave.php' script is not properly sanitized before being used to read files. This can be exploited by an unauthenticated attacker to read arbitrary files on the affected system.
This project provides a full implementation of the 'namedobj' kernel exploit for the PlayStation 4 on 4.05. It will allow you to run arbitrary code as kernel, to allow jailbreaking and kernel-level modifications to the system. This exploit does include a loader that listens for payloads on port 9020 and will execute them upon receival.
In the CSV export feature of the SilverStripe CMS, it's possible for the output to contain macros and scripts, which if imported without sanitization into software (including Microsoft Excel) may be executed.
The software suffers from a SQL Injection vulnerability in the '/API/index.php?action=compose&username=sender&api_key=sdsd&sender' endpoint. An attacker can exploit this vulnerability to gain access to the admin email and password.
The vulnerability allows an attacker download local files from the vulnerable application.