The Online Shopping System Advanced version 1.0 is vulnerable to SQL injection due to improper filtering of user-provided input in the 'cm' parameter. An attacker can inject malicious SQL statements through the 'cm' parameter, leading to unauthorized access to the database and exposure of sensitive information like user credentials.
The 'searchtitle' parameter in 101 News-1.0 is vulnerable to SQL injection attacks. By injecting a SQL sub-query payload that calls MySQL's load_file function with a UNC file path referencing an external domain, an attacker can execute malicious SQL queries. The application interacts with the external domain, confirming the successful execution of the injected SQL query.
An incorrect access control vulnerability exists in WyreStorm Apollo VX20 devices before version 1.3.58. Remote attackers can exploit this issue by sending a specific HTTP GET request to reboot the device.
The exploit script allows an attacker to perform an XSS attack that leads to remote code execution on Wondercms version 4.3.2. By injecting a malicious script through a crafted link, the attacker can execute arbitrary commands on the server.
The DataCube3 version 1.0 allows attackers to perform remote code execution through an unrestricted file upload vulnerability. By exploiting this flaw, an attacker could upload malicious files to the server, leading to the execution of arbitrary code. This vulnerability has been assigned CVE-2024-25830 and CVE-2024-25832.
The Boss Mini version 1.4.0 is vulnerable to local file inclusion due to improper input validation. An attacker can exploit this vulnerability to read arbitrary files on the system. This exploit has been assigned CVE-2023-3643.
The GL.iNet <= 3.216 allows remote code execution via the OpenVPN client. An attacker can exploit this vulnerability by adding a malicious configuration file and client to the OpenVPN, which can lead to unauthorized access and potential compromise of the device. This vulnerability has been assigned CVE-2023-46456.
The GL.iNet <= 4.3.7 allows an authenticated attacker to write arbitrary files via a crafted POST request, leading to unauthorized access. This vulnerability has been assigned CVE-2023-46455.
This exploit leverages a broken access control vulnerability in Atlassian Confluence servers, enabling an attacker to bypass authentication. By sending a specially crafted request, an unauthorized admin account can be created on the targeted Atlassian server.
The exploit allows for the execution of arbitrary commands, enabling the opening of a reverse shell connection on systems using OSGi v3.7.2 and earlier.