When a file named 'xss.html' is downloaded in the Pydio Cells web application, a download URL is generated. The URL contains a parameter 'response-content-disposition' which is set to 'attachment' causing the browser to download the file instead of interpreting it. The URL also contains a signature, expiry timestamp, and the user's JWT for authentication. The access key with the ID 'gateway' is referenced, which can be found in the JavaScript sources of Pydio Cells together with the secret.
This exploit allows an attacker to upload files to the Faculty Evaluation System 1.0 without authentication, potentially leading to remote code execution. The vulnerability exists in the login.php page, which does not properly validate user input.
The Online Security Guards Hiring System version 1.0 is vulnerable to a reflected XSS attack. This allows an attacker to execute malicious scripts in the victim's browser, potentially leading to unauthorized access or data theft.
The `email` parameter in SCRMS 2023-05-27 1.0 is vulnerable to SQL injection attacks. An attacker can exploit this vulnerability to steal user information, including passwords, from the system.
The Rukovoditel version 3.3.1 is vulnerable to CSV injection. By setting the Firstname field as '=calc|a!z|', an attacker can trigger a CSV injection attack and open the calculator on the admin's computer when the admin exports customers as a CSV file.
Camaleon CMS v2.7.0 was discovered to contain a Server-Side Template Injection (SSTI) vulnerability via the formats parameter.
The exploit allows an authenticated user to create a new user or group with a malicious payload that triggers a cross-site scripting vulnerability. This can lead to the execution of arbitrary code or the stealing of sensitive information.
This code is written in python and helps to create an admin account on ulicms-2023.1-sniffing-vicuna
The Zenphoto 1.6 application is vulnerable to multiple stored Cross-Site Scripting (XSS) attacks. These vulnerabilities allow an attacker to inject malicious scripts into various parts of the application, which can lead to unauthorized access or information disclosure.
The WBCE CMS version 1.6.1 is vulnerable to multiple stored cross-site scripting (XSS) attacks. An attacker can upload a malicious SVG file containing a script that will be executed when viewed by an authenticated user with administrative privileges. This can lead to the execution of arbitrary code or the theft of sensitive information.