A persistent input validation vulnerability has been discovered in the official Draytek VigorAP product series application. The vulnerability allows remote attackers to inject own malicious script codes with persistent attack vector to compromise browser to web-application requests from the application-side. The persistent input validation web vulnerability is located in the username input field of the RADIUS Setting - RADIUS Server Configuration module. Remote attackers with limited access are able to inject own malicious persistent script codes as username.
An authentication bypass vulnerability exists in Car Park Management System 1.0. By sending a specially crafted request, an attacker can bypass authentication and gain access to the application.
A denial of service vulnerability exists in FlashGet 1.9.6. A remote attacker can send a specially crafted FTP request with a long string in the PWD command to cause a buffer overflow, resulting in a denial of service condition. The vulnerability is due to insufficient boundary checks when handling FTP requests. An attacker can send a specially crafted FTP request with a long string in the PWD command to trigger this vulnerability.
MPC Sharj is a free open source script for creating sim card credit card's shop. The vulnerability exists in the download.php file, where the parameter 'id' is vulnerable to an arbitrary file download attack. An attacker can craft a malicious payload by converting the file to be read into base64, then reversing the base64 string, and finally passing it as a parameter to the download.php file.
YesWiki cercopitheque 2020-04-18-1 is vulnerable to SQL Injection. An attacker can exploit this vulnerability to gain access to sensitive information stored in the database. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'id' parameter of the 'BazaR' script. An attacker can send a specially crafted HTTP request containing malicious SQL statements to the vulnerable script and execute arbitrary code on the underlying database.
An arbitrary file read vulnerability exists in GitLab version 12.9.0. An attacker can exploit this vulnerability to read arbitrary files from the server. This vulnerability is OS independent and affects all supported platforms.
An unauthenticated attacker can inject malicious SQL code into the 'username' parameter of the login.php page of the Online Clothing Store 1.0 application. By sending a specially crafted request, an attacker can bypass authentication and gain access to the application.
Booked Scheduler is vulnerable to an authenticated directory traversal vulnerability. This vulnerability allows an authenticated user to access files outside of the web root directory. The vulnerable parameter is $tn, which is located in the manage_email_templates.php file. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the server.
ONLINE CLOTHING STORE 1.0 is vulnerable to Stored XSS. Admin user can add malicious script to offer page. When a normal user visits the page, the script gets executed.
NEC SL2100 (NEC Electra Elite IPK II WebPro) Session Enumeration is a vulnerability that allows an attacker to enumerate valid session IDs and gain access to the system.