header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

eScan Management Console 14.0.1400.2281 – SQL Injection (Authenticated)

Authenticated SQL Injection vulnerability in eScan Management Console version 14.0.1400.2281 allows an attacker to execute arbitrary SQL commands through the 'UsrId' parameter in the GetUserCurrentPwd function, leading to unauthorized access to the database and potential remote code execution.

SitemagicCMS 4.4.3 Remote Code Execution (RCE)

The SitemagicCMS version 4.4.3 is vulnerable to remote code execution (RCE). An attacker can upload a malicious shell.phar file with the content '<?php echo system("cat /etc/passwd"); ?>' and execute arbitrary commands on the target system. This can lead to unauthorized access, data leakage, and further compromise of the system. The vulnerability was found by Mirabbas Agalarov.

Prestashop 8.0.4 – CSV injection

This exploit allows an attacker to inject malicious formulas into a CSV file, which can then be executed when opened by a user. In this case, the exploit is triggered when an admin exports customers as a CSV file and opens it on their computer. The payload used in this exploit is '=calc|a!z|@test.com', which opens the calculator on the admin's computer.

Screen SFT DAB 600/C – Unauthenticated Information Disclosure (userManager.cgx)

Screen is affected by an information disclosure vulnerability due to improper access control enforcement. An unauthenticated remote attacker can exploit this, via a specially crafted request to gain access to sensitive information including usernames and source IP addresses.

Screen SFT DAB 600/C – Authentication Bypass Reset Board Config

The application suffers from a weak session management that can allow an attacker on the same network to bypass these controls by reusing the same IP address assigned to the victim user (NAT) and exploit crucial operations on the device itself. By abusing the IP address property that is binded to the Session ID, one needs to await for such an established session and issue unauthorized requests to the vulnerable API to manage and/or manipulate the affected transmitter.

Screen SFT DAB 600/C – Authentication Bypass Erase Account

The application suffers from a weak session management that can allow an attacker on the same network to bypass these controls by reusing the same IP address assigned to the victim user (NAT) and exploit crucial operations on the device itself. By abusing the IP address property that is binded to the Session ID, one needs to await for such an established session and issue unauthorized requests to the vulnerable API to manage and/or manipulate the affected transmitter.

Screen SFT DAB 600/C – Authentication Bypass Password Change

The application suffers from a weak session management that can allow an attacker on the same network to bypass these controls by reusing the same IP address assigned to the victim user (NAT) and exploit crucial operations on the device itself. By abusing the IP address property that is binded to the Session ID, one needs to await for such an established session and issue unauthorized requests to the vulnerable API to manage and/or manipulate the affected transmitter.

Screen SFT DAB 600/C – Authentication Bypass Account Creation

The application suffers from a weak session management that can allow an attacker on the same network to bypass these controls by reusing the same IP address assigned to the victim user (NAT) and exploit crucial operations on the device itself. By abusing the IP address property that is binded to the Session ID, one needs to await for such an established session and issue unauthorized requests to the vulnerable API to manage and/or manipulate the affected transmitter.

Recent Exploits: