An SQL injection vulnerability exists in Spotweb 1.4.9. A remote attacker can send a specially crafted HTTP request containing malicious SQL statements to the vulnerable application. Successful exploitation of this vulnerability could allow an attacker to gain access to sensitive information from the database.
Queue Management System 4.0.0 is vulnerable to stored XSS. An attacker can exploit this vulnerability by inserting malicious payloads in the "First Name", "Last Name" and "Email" fields of the "Add User" page. When an admin user visits the "User List" page, the malicious payload will be executed, resulting in the execution of arbitrary JavaScript code in the context of the admin user's browser.
RedTeam Pentesting discovered a vulnerability in FRITZ!Box router devices which allows to resolve DNS answers that point to IP addresses in the private local network, despite the DNS rebinding protection mechanism.
A stored XSS vulnerability exists in Xeroneit Library Management System 3.1, which allows an attacker to inject malicious JavaScript code into the 'Category Name' field when adding a new book category. This malicious code is then stored in the application and executed when the page is loaded by an authenticated user.
SyncBreeze 10.0.28 is vulnerable to a denial of service attack when a maliciously crafted HTTP POST request is sent to the login page. The payload of 1000 'A' characters causes the application to crash.
Smart Hospital 3.1 is vulnerable to Stored XSS. An attacker can exploit this vulnerability by logging in to the application with Super Admin credentials, clicking on "OPD-Out Patient" and then clicking on "Add Patient" then selecting "Add Patient" Again. The attacker can then insert payload - "><svg/onmouseover=alert(1)> , in Name , Guardian Name , Email , Address , Remarks and Any Known Allergies and Save it. When the user moves around the patient profile details, an alert box will be shown.
This module exploits an unauthenticated directory traversal vulnerability in WordPress plugin 'Duplicator' plugin version 1.3.24-1.3.26, allowing arbitrary file read with the web server privileges. This vulnerability was being actively exploited when it was discovered.
An Unrestricted File Upload vulnerability in Alumni Management System 1.0 allows an attacker to upload a malicious PHP webshell to the server. By visiting the ‘/admin/assets/uploads/’ directory, the attacker can execute arbitrary code on the server.
Easy authentication bypass vulnerability on the application allows an attacker to log in as Administrator. Step 1: On the login page, simply use { ' or 0=0 # } as username. Step 2: On the login page, use same query{ ' or 0=0 # } as password. All set you should be logged in as Administrator.
This exploit is a proof of concept for a denial of service vulnerability in Nxlog Community Edition 2.10.2150. The exploit sends a malicious syslog packet to the NXLOG server, which causes the service to crash. The malicious packet contains a priority of 30 and a message of 'Silence is golden'. The exploit can be used to target both Unix and Windows systems.