User[username] parameter has a xss vulnerability. Malicious code is being written to database while user is creating process. To exploit vulnerability,add user that setting username as <sCript>alert("XSS")</sCript> malicious code.
A buffer overflow vulnerability was discovered in the Microsoft Font Subsetting DLL (fontsub.dll) which is a default Windows helper library for subsetting TTF fonts. The vulnerability is triggered by a malformed font file in the fontsub.dll code through a testing harness which invokes a pseudo-random sequence of API calls with a chosen font file passed as input.
A stored XSS vulnerability exists in the Tenda D301 v2 modem router. An attacker can exploit this vulnerability by entering a malicious payload in the password field of the router's web interface. When the user clicks on the 'click to display' button, the malicious payload will be executed, allowing the attacker to gain access to the user's cookies.
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. File Extension parameter is not properly escaped. This could lead to an XSS attack that could possibly affect administrators,users,editor.
A buffer overflow vulnerability exists in SNMPc Enterprise Edition (9 & 10) when handling specially crafted mapping files. An attacker can exploit this vulnerability by sending a specially crafted mapping file to the application, resulting in arbitrary code execution.
A buffer overflow vulnerability exists in Adobe Font Development Kit for OpenType (AFDKO) due to insufficient input validation. This vulnerability affects Windows 10 1709 (Fall Creators Update) and later versions, as Microsoft's DirectWrite library includes parts of AFDKO. The vulnerability can be triggered by sending a specially crafted font file to the Direct2D printing interface, which can lead to arbitrary code execution.
A specially crafted OpenType/CFF font can be used to trigger a buffer overflow in the AFDKO library, which can lead to arbitrary code execution in the context of the current user.
A specially crafted font file can be used to exploit a vulnerability in Adobe Font Development Kit for OpenType (AFDKO) to elevate privileges to SYSTEM on Windows 10. This vulnerability is due to the lack of input validation in AFDKO, which allows an attacker to craft a malicious font file that can be used to execute arbitrary code with SYSTEM privileges. The vulnerability is reachable through Microsoft's DirectWrite library, which includes parts of AFDKO, and specifically the modules for reading and writing OpenType/CFF fonts. The code is reachable through dwrite!AdobeCFF2Snapshot, called by methods of the FontInstancer class, called by dwrite!DWriteFontFace::CreateInstancedStream and dwrite!DWriteFactory::CreateInstancedStream. This strongly indicates that the code is used for instancing the relatively new variable fonts, i.e. building a single instance of a variable font with a specific set of attributes. The CreateInstancedStream method is not a member of a public COM interface, but it can be reached through the Direct2D printing interface.
Spidermonkey implements a definite property analysis to compute which properties will definitely exist on the constructed objects. This mechanism makes it possible to omit some Shape updates in JITed code. However, in the JavaScript program discovered through fuzzing and then manually modified, Spidermonkey appears to incorrectly handle such a scenario. When run on a local Spidermonkey built from the beta branch or in Firefox 66.0.3 with `javascript.options.unboxed_objects` set to true in about:config, it will eventually output something like 'Success: 0x2d2d2d2d'. Here, the definite property analysis concluded that .uninitialized is definitely assigned to the constructed objects and not accessed before it is assigned (which is wrong). In particular, it seems that the catch block is entirely ignored by the analysis as it is not present in the Ion graph representation of v10 on which the analysis is based.
This exploit allows an unauthenticated attacker to execute arbitrary commands on a vulnerable Siemens TIA Portal device. The vulnerability exists due to improper validation of user-supplied input in the web-based management interface. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable device.