A stored cross-site scripting (XSS) in Pandora FMS 7.0 NG 747 can result in an attacker performing malicious actions to users who open a maliciously crafted link or third-party web page. To exploit vulnerability, someone could use a POST request to '/pandora_console/index.php' by manipulating 'filename' parameter in the request body to impact users who open a maliciously crafted link or third-party web page.
WordPress Plugin Email Subscribers & Newsletters version 4.2.2 is vulnerable to an unauthenticated SQL injection vulnerability. An attacker can exploit this vulnerability by sending a crafted request to the vulnerable application. This can allow an attacker to gain access to sensitive information such as user credentials, subscriber information, and Simple WP SMTP settings.
A vulnerability in WordPress Plugin Email Subscribers & Newsletters 4.2.2 allows an unauthenticated attacker to download arbitrary files from the server. This is due to the lack of input validation in the 'es_file_download' function, which allows an attacker to download any file from the server. This vulnerability can be exploited by sending a specially crafted HTTP request to the vulnerable server.
Free MP3 CD Ripper 2.8 is vulnerable to a stack buffer overflow vulnerability when a long string is passed to the application. This can be exploited to execute arbitrary code by corrupting the SEH chain and using an egghunter to locate the shellcode.
The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.
ManageEngine Applications Manager 12 and 13 before Build 13200 are vulnerable to a SQL Injection vulnerability in the MenuHandlerServlet servlet. An attacker can exploit this vulnerability to extract all users and passwords from the database, as well as create new users with administrative privileges.
GOautodial 4.0 is vulnerable to a persistent cross-site scripting (XSS) vulnerability. An authenticated user can inject malicious JavaScript code into a message sent to another user. The code will be executed when the recipient reads the message.
A buffer overflow vulnerability exists in DiskBoss 7.7.14 due to improper bounds checking of user-supplied input. An attacker can exploit this vulnerability by supplying a specially crafted input to the 'Reports and Data Directory' field in the DiskBoss Options menu. This can result in arbitrary code execution in the context of the application.
System parse JSON data. If we want to send some JSON with invalid data format for ex. valid -> {"test","test2"} , invalid -> {"test",PAYLOAD"test2"} The system can not parse this data fastly and service down payload_option2 ="../../../../../../../../../FILE./FILE"
docsify.js uses fragment identifiers (parameters after # sign) to load resources from server-side .md files. It then renders the .md file inside the HTML page. Due to lack of validation it is possible to provide external URLs after the /#/ and render arbitrary javascript/HTML inside the page which leads to DOM-based Cross Site Scripting (XSS).