Vulnerabilities were found in the Central WiFiManager Software Controller, allowing unauthenticated and authenticated file upload with dangerous type that could lead to remote code execution with system permissions. Also, two stored Cross Site Scripting vulnerabilities were found.
Due to improper session management an attacker is able to add a administrator account without providing any authentication credentials.
A buffer overflow vulnerability exists in NICO-FTP 3.0.1.19 which allows an attacker to execute arbitrary code by sending a specially crafted payload to the vulnerable application. The vulnerability is caused due to a boundary error when handling user-supplied input, specifically when handling the 'Sites.conf' file. This can be exploited to cause a stack-based buffer overflow by sending a specially crafted payload to the vulnerable application. Successful exploitation of this vulnerability could result in arbitrary code execution in the context of the application.
LayerBB Forum 1.1.1 is vulnerable to a SQL Injection vulnerability. An attacker can send a specially crafted HTTP POST request to the search.php page with a malicious search_query parameter to execute arbitrary SQL commands in the backend database.
A buffer overflow vulnerability exists in FTP Voyager 16.2.0, which could allow an attacker to cause a denial of service condition. The vulnerability is due to improper bounds checking of user-supplied data, which can be exploited by an attacker to cause a stack-based buffer overflow by sending a specially crafted request to the vulnerable application. An attacker can send a specially crafted request containing an overly long string to trigger this vulnerability.
A SQL injection vulnerability exists in Joomla! Component Jimtawl 2.2.7, which allows an attacker to inject malicious SQL queries via the 'id' parameter in the 'index.php' script. An attacker can exploit this vulnerability to gain access to sensitive information from the database, such as usernames and passwords.
Zechat 1.5 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to the database and execute arbitrary SQL commands. The attacker can also use the 'uname' parameter to inject malicious SQL code into the application. The attacker can then use the make_set() function to extract data from the database.
OPAC EasyWeb Five 5.7 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending a specially crafted HTTP POST request to the vulnerable application. The POST request contains a malicious SQL query in the 'nome' parameter. This can allow an attacker to gain access to the database and execute arbitrary SQL commands.
A Stored XSS vulnerability has been discovered in the v5.5.0 version of the Coaster CMS product. An attacker can send a malicious HTTP POST request with a malicious script in the 'block[21]' parameter to execute arbitrary JavaScript code in the victim's browser.
A SQL injection vulnerability exists in OPAC EasyWeb Five 5.7. An attacker can send a malicious SQL query to the vulnerable parameter 'biblio' in the 'index.php' script to execute arbitrary SQL commands in the back-end database.