The /etc/init.d/opsview-reporting-module script that runs at boot time in Opsview Monitor before 5.3.1 and 5.4.x before 5.4.2 invokes a file that can be edited by the nagios user, and would allow attackers to elevate their privileges to root after a system restart, hence obtaining full control of the appliance.
sspa is a server dedicated to single-page apps. sspa is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
The breadcrumbs contributed module through 0.2.0 for Padrino Framework allows XSS via a caption.
Roundcube Webmail before 1.4.8 allows stored XSS in HTML messages during message display via a crafted SVG document.