Attackers can bypass the admin login page due to unsanitized user input and access internal contents. The vulnerable code is located in /admin/index.php, line 34, where the query is constructed without sanitizing the user input. The payload used is 'admin' or '1' = '1 -- -' which allows the attacker to bypass the authentication.
Chevereto 3.17.1 is vulnerable to Cross Site Scripting (Stored) vulnerability. An attacker can exploit this vulnerability by uploading an image and writing '><svg/onload=alert(1)> instead of the title. After uploading the image, the attacker can go to the picture address and execute malicious code.
Odoo 12.0.20190101 is vulnerable to Unquoted Service Path vulnerability. This vulnerability can be exploited by malicious users to gain privileges. The vulnerability is due to the application not properly quoting the path of the service executable. A malicious user can exploit this vulnerability to gain elevated privileges.
The web application allows for an assistant to inject persistent Cross-Site-Scripting payload which will be executed in both assistant and Super Admin panel. An attacker can use this vulnerability to take over Super Admin account.
PHP Timeclock version 1.04 (and prior) suffers from multiple Cross-Site Scripting vulnerabilities. Unauthenticated Reflected XSS can be injected into the application by appending a termination /'> and payload directly to the end of the GET request URL. The vulnerable paths include (1) /login.php (2) /timeclock.php (3) /reports/audit.php and (4) /reports/timerpt.php. Unauthenticated Reflected XSS can also be injected into the application in POST requests to (1) /reports/audit.php (2) /reports/total_hours.php (3) /reports/timerpt.php via the from_date and to_date parameters.
This vulnerability could permit executing code during startup or reboot with the escalated privileges.
This vulnerability could permit executing code during startup or reboot with the escalated privileges.
This vulnerability could permit executing code during startup or reboot with the escalated privileges.
PHP Timeclock is vulnerable to both Boolean and Time Based SQL Injection on login.php via the login_userid parameter. This PoC shows how SQLmap can be used to exploit this vulnerability to dump database contents. Boolean Based Payload: user' RLIKE (SELECT (CASE WHEN (8535=8535) THEN 0x75736572 ELSE 0x28 END))-- QwMo&login_password=pass. Time Based Payload: user' AND (SELECT 4247 FROM (SELECT(SLEEP(5)))ztHm) AND 'WHmv'='WHmv&login_password=pass.
The web application allows for an unauthenticated file upload which can result in a Remote Code Execution.