Cassandra Web is vulnerable to directory traversal due to the disabled Rack::Protection module. Apache Cassandra credentials are passed via the CLI in order for the server to auth to it and provide the web access, so they are also one thing that can be captured via the arbitrary file read.
Responsive FileManager 9.13.4 is vulnerable to Path Traversal. An attacker can exploit this vulnerability to read arbitrary files from the server. This vulnerability is due to insufficient sanitization of user-supplied input in the 'path' parameter of the 'ajax_calls.php' script. An attacker can exploit this vulnerability by sending a crafted HTTP request containing directory traversal sequences (e.g., '../') to the vulnerable script. Successful exploitation of this vulnerability will allow an attacker to read arbitrary files from the server.
Log in with a valid username and password. Navigate to the 'Post' tab on the left-hand side. Add the new post and then add the payload '<audio src/onerror=alert(document.cookie)' in 'Post title' parameter and click on save button. Post Saved successfully. Now, XSS will get stored and trigger every time and the attacker can steal authenticated users' cookies.
The 'id=' parameter in Responsive E-Learning System is vulnerable to Sql Injection.
An authentication bypass vulnerability exists in Online Movie Streaming 1.0. An attacker can exploit this vulnerability by entering anything@mail.com as the username and ' or '1'='1'# as the password in the user-login.php page. This will allow the attacker to bypass the authentication and gain access to the application.
A Stored Cross-site scripting (XSS) was discovered in wordpress plugins WP-Paginate(Ver_2.1.3). Vulnerability parameters : 2nd parameter 'preset' have Stored-XSS.
A Stored Cross-site scripting (XSS) was discovered in wordpress plugins stripe-payments (Ver_2.0.39). Vulnerability parameters : 'AcceptStripePayments-settings[currency_code]' have Cross-Site Scripting.
An attacker can bypass authentication by entering ' or '1'='1'# as the username and any value as the password in the login page of the Resumes Management and Job Application Website 1.0.
IncomCMS 2.0 is vulnerable to an insecure file upload vulnerability. An attacker can upload malicious files to the server without any authentication. This can lead to remote code execution and other malicious activities.
An attacker requires to drop a malicious executable into the service path undetected by the OS in order to gain SYSTEM privileges.