Multiple remote file inclusion vulnerabilities exist in PeopleAggregator 1.2pre6. These vulnerabilities allow an attacker to include arbitrary files from remote servers, potentially leading to remote code execution or information disclosure.
In the 5.4.0 version of the Fork CMS software, HTML Injection and Stored XSS vulnerabilities were discovered via the /backend/ajax URI.
This takes advantage of the CREATE ALIAS RCE (https://www.exploit-db.com/exploits/44422/). When the test database has a password that is unknown, it is still possible to get the execution by creating a new database. The web console allows this by entering the name of the new database in the connection string. When the new database is created, the default credentials of username “sa” and password “” (blank) are created. The attacker is logged in automatically. The attached Python code, modified from 44422, demonstrates this.
Vulnerability occurs when the Zahir cannot handle large inputs and anomalies crafted CSV file. The Zahir main program failed to process the CR LF (Carriage Return Line Feed) characters which caused the Zahir main program to crash.
PCProtect Anti-Virus v4.8.35 installs with weak folder permissions and a service that can be exploited to escalate privileges to NT AUTHORITYSYSTEM.
The EE 4GEE Mini EE40_00_02.00_44 device is vulnerable to privilege escalation. This allows an attacker to gain elevated privileges on the affected system.
An issue was discovered in Rausoft ID.prove 2.95. The login page with a field "Username" is vulnerable to the SQL injection via Microsoft SQL Server stacked queries in the Username POST parameter. Hypothetically, an attacker can utilize master..xp_cmdshell for the further privilege elevation.
This exploit allows for remote blind SQL injection in BBPortalS and BBsProcesS scripts. The vulnerability can be found using the dork "inurl : tnews.php?op". The exploit has been tested on versions 1.5.10, 1.6.2, and 1.5.11. For version 2.0, the field names are 'user' and 'password', but the table name needs to be discovered separately. The exploit uses Perl and the LWP::UserAgent module.
Zoho ManageEngine Desktop Central 10.0.271 has XSS via the "Features & Articles" search field to the /advsearch.do?SUBREQUEST=XMLHTTP URI.
This exploit takes advantage of the AddAc function to escalate privileges on a Windows system. By exploiting this vulnerability, an attacker can gain elevated privileges and potentially execute malicious code. This exploit has been tested on Windows 7 and Windows 10 systems.