A SQL injection vulnerability exists in OS4Ed Open Source Information System Community v8.0 via the 'student_id' and 'TRANSFER{SCHOOL]' parameters in POST request sent to /TransferredOutModal.php. If an attacker exploits this vulnerability, attacker may access private data in the database system.
The WiFi access point password gets disclosed just by performing a GET request with certain headers
An unauthenticated remote code execution vulnerability exists in Terramaster TOS 4.2.15. An attacker can exploit this vulnerability by sending a specially crafted request to the target system. This can allow the attacker to execute arbitrary code on the target system.
TRIGONE Remote System Monitor 3.61 is vulnerable to Unquoted Service Path vulnerability. An attacker can exploit this vulnerability to gain elevated privileges on the system. The vulnerability exists due to the service path of the RemoteSystemMonitorService not being properly quoted. By exploiting this vulnerability, an attacker can gain elevated privileges on the system.
Unauthenticated cross-site scripting (XSS) vulnerability in BeyondTrust Secure Remote Access Base Software through 6.0.1 allow remote attackers to inject arbitrary web script or HTML. Remote attackers could acheive full admin access to the appliance, by tricking the administrator into creating a new admin account through an XSS/CSRF attack involving a crafted request to the /appliance/users?action=edit endpoint.
Insecure Direct Object References (IDOR) occur when an application provides direct access to objects based on user-supplied input.Insecure Direct Object References allow attackers to bypass authorization and access resources directly by modifying the value of a parameter used to directly point to an object. Such resources can be database entries belonging to other users, files in the system.
Hospital's Patient Records Management System v1.0 is vulnerable to SQL injection via the 'id' parameter on the patient list. An attacker can compromise the database of the application using some automated(or manual) tools like SQLmap. Attack vector: On the dashboard navigate to 'Patient List', then go to 'Action' > 'View Records' page using the following URL: http://localhost/hprms/admin/?page=patients/view_patient&id=1. Put the SQL Injection payloads in 'id' field. time-based blind payload : page=patients/view_patient&id=1' AND (SELECT 2664 FROM (SELECT(SLEEP(5)))ixec) AND 'XcAY'='XcAY. Now, the Server target accepted our payload and the response got delayed by 5 seconds.
AWebServer GhostBuilding 18 is vulnerable to a remote denial of service (DoS) attack. An attacker can send a specially crafted request to the server, causing it to crash and become unresponsive. This vulnerability affects all versions of AWebServer GhostBuilding 18.
A Cross Site Scripting (XSS) vulnerability exists in Hostel Management System 2.1, which allows an attacker to inject malicious JavaScript code into the application. By entering a malicious payload into various input fields, such as Correspondence Address, Guardian Relation, Permanent Address, Guardian Name, Guardian Address, Student Name, and Student Address, an attacker can execute arbitrary JavaScript code in the victim's browser.
An attacker can bypass authentication by sending a crafted username and password in a POST request to the vulnerable application. The username should be set to '1' or 1=1;-- and the password should be set to ", which will bypass the authentication process and allow the attacker to access the application.