The Opmon version 9.11 is vulnerable to cross-site scripting (XSS) attacks. An attacker can inject malicious script code into certain input fields, which will be executed by the victim's browser. This can lead to session hijacking, cookie theft, or other malicious activities.
Unquoted service path vulnerability in Sherpa Connector Service v2020.2.20328.2050 allows an attacker to escalate privileges by placing a malicious executable in the path of the service.
This plugin creates a avatar_uploader from any post types. The slider import search feature and tab parameter via plugin settings are vulnerable to reflected cross-site scripting.
The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path. If a malicious individual has access to the file system, it is possible to elevate privileges by inserting such a file as "C:Program.exe" to be run by a privileged program making use of WinExec.
The application is vulnerable to improper access control that allows an authenticated operator to disclose SHA1 password hashes (client-side) of other users/operators.
The application has an update password feature which has a CSRF vulnerability that allows an attacker to change the password of any arbitrary user leading to an account takeover.
The 'Service SbieSvc' in Sandboxie-Plus version 5.50.2 has an unquoted service path vulnerability. This allows an attacker with local access to escalate privileges by placing a malicious executable with the same name in a higher-priority directory.
The WOW21_Service in WOW21 version 5.0.1.9 on Windows 10 Pro x64 allows local users to gain elevated privileges via an unquoted service path.
This is a proof-of-concept exploit for the Dirty Pipe vulnerability (CVE-2022-0847) in the Linux Kernel. The vulnerability is caused by an uninitialized 'pipe_buffer.flags' variable, allowing an attacker to overwrite file contents in the page cache even if the file is not permitted to be written, immutable, or on a read-only mount. The exploit requires Linux 5.8 or later and has certain limitations, such as the offset not being on a page boundary and the write not crossing a page boundary.
A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.