How to override shared libraries when the program employs symbol versioning and other non standard linking options.| cardaci.xyz
A logic bug enables a trivial bypass of the basic authentication mechanism of the proxy.| cardaci.xyz
Improper sanitization causes malicious JavaScript code in received emails to be executed when the message is displayed.| cardaci.xyz
The fix for CVE-2019-9858 (arbitrary file upload vulnerability) simply restricts the target directory to the temp folder. This, in combination with other vulnerabilities, allows an authenticated regular user to execute PHP and shell code as the user that runs the web server.| cardaci.xyz
A vulnerability in the handling of CSV data import allows authenticated users to inject arbitrary PHP code thus achieving RCE on the server hosting the web application.| cardaci.xyz
Privilege escalation to root can be achieved by a regular user via the password reset form exploiting a directory traversal vulnerability.| cardaci.xyz
Privilege escalation to root can be achieved by a regular user via the file upload handler exploiting an insufficient shell escaping mechanism.| cardaci.xyz
The insufficient output sanitization and inappropriate content type of the responses of the file manager API allows to run arbitrary JavaScript code in the context of the web application.| cardaci.xyz
Improper sanitization causes malicious JavaScript code in received emails to be executed when the message is displayed.| cardaci.xyz
The default authentication method allows an attacker to log into a MySQL server by only witnessing to the TCP handshake and knowing the hashed password.| cardaci.xyz