The WorkTime software version 10.20 Build 4967 is affected by an unquoted service path vulnerability. The vulnerability allows an attacker with local access to escalate privileges and potentially execute arbitrary code.
There is an issue with link creation in the GUI with Open-AudIT Community. If a bad value is passed to the routine via a URL, javascript code can be executed. This requires the user be logged in to Open-AudIT Community to trigger.
VUPlayer 2.49 Local Buffer Overflow to Arbitrary Code Execution (Importing .wax playlist file) (Bypass DEP protection)
This exploit allows an attacker to escalate their privileges locally on a system running Automox Agent 32. By manipulating the agent's script files, the attacker can execute arbitrary commands with elevated privileges.
Projeqtor version 9.3.1 suffers from a stored XSS vulnerability via SVG file upload. A low level user can upload svg images that contain malicious Javascript. In this way an attacker can escalate privileges and upload a malicious plugin which results in arbitrary code execution in the server hosting the application.
The Virtual Airlines Manager version 2.6.2 is vulnerable to multiple SQL Injection attacks. The vulnerability exists in various GET parameters, including notam_id, airport, registry_id, plane_location, hub_id, pilot_id, event_id, and tour_id. An attacker can exploit these parameters to inject malicious SQL queries, potentially leading to unauthorized access, data manipulation, or data disclosure.
The SAFARI Montage version 8.5 is vulnerable to a reflected cross-site scripting (XSS) attack. An attacker can execute arbitrary JavaScript code in the victim's browser by injecting malicious code through the 'redirect.php' parameter 'cmd'. This vulnerability allows the attacker to steal sensitive information, such as session cookies, from the victim.
Accu-Time Systems MAXIMUS 1.0 Telnet Remote Buffer Overflow
RiteCMS version 3.1.0 and below suffers from a remote code execution in admin panel. An authenticated attacker can upload a php file and bypass the .htacess configuration that deny execution of .php files in media and files directory by default. There are 4 ways of bypassing the current file upload protection to achieve remote code execution.
RiteCMS version 3.1.0 and below suffers from an arbitrary file deletion vulnerability in Admin Panel. Exploiting the vulnerability allows an authenticated attacker to delete any file in the web root (along with any other file on the server that the PHP process user has the proper permissions to delete). Furthermore, an attacker might leverage the capability of arbitrary file deletion to circumvent certain webserver security mechanisms such as deleting .htaccess file that would deactivate those security constraints.