An easy way to add a sitemap on one of your pages becomes reality thanks to this WordPress plugin. Just use the shortcode [wp_sitemap_page] on any of your pages. This will automatically generate a sitemap of all your pages and posts. An attacker can inject malicious JavaScript code into the ‘Exclude pages’ field of the plugin settings page, which will be executed when a user visits the page containing the sitemap.
LabVantage 8.3 is vulnerable to an information disclosure vulnerability. An attacker can exploit this vulnerability by sending a specially crafted request to the target server. This request will return the database name and version of the LabVantage application, which can be used to further exploit the application.
A vulnerability in the Wordpress Plugin WOOF Products Filter for WooCommerce 1.2.3 allows an attacker to inject malicious JavaScript code into the application. This code can be executed when a user visits the affected page. The attacker can use this vulnerability to steal user data, hijack user sessions, and perform other malicious activities.
A vulnerability exists in TFTP Turbo 4.6.1273 due to an unquoted service path. An attacker can exploit this vulnerability to gain elevated privileges on the system.
Fruitful is Free WordPress responsive theme with powerful theme options panel and simple clean front end design. To exploit this vulnerability, an attacker can inject malicious JavaScript code into the Name and Email fields of the comment form. When the comment is posted, the malicious code will be executed in the browser of the user who views the comment.
The Ice HRM Web Application is vulnerable to CSRF that leads to arbitrary user creation or password change. The POC for user creation includes a form with hidden inputs that when submitted, creates a user with the username 'test' and email 'test@test.com'. The POC for password change includes a form with hidden inputs that when submitted, changes the password of the user with the ID 1 to 'admin123'.
DHCP Turbo 4.61298 is vulnerable to Unquoted Service Path vulnerability. This vulnerability allows an attacker to gain elevated privileges on the system by exploiting the service path of the application. The service path of the application is not quoted which allows an attacker to inject malicious code in the service path and gain elevated privileges.
This exploit generates a reverse shell to a nc listener by exploiting the Shellshock vulnerability in Avaya Aura Communication Manager 5.2. It takes three arguments - Victim's IP, Attacker's IP and Reverse Shell Port.
A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.
The SOPlanning 1.45 application is vulnerable to SQL Injection which can be leveraged into getting the information for the users table.