The viewid paramater is vulnerable to Insecure direct object references (IDOR). An attacker can exploit this vulnerability by changing the viewid parameter in the URL to access sensitive information of other users.
Argus Surveillance DVR 4.0 is vulnerable to Unquoted Service Path vulnerability. This vulnerability can be exploited by an attacker to gain elevated privileges on the system. The attacker can use the 'sc qc' command to query the service configuration and the 'wmic service get' command to get the service name, display name, path name and start mode. If the service is configured to start automatically and the path is not quoted, the attacker can gain elevated privileges on the system.
OpenEMR 6.0.0 is vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability. By changing the existing 'noteid=' value to another number in the 'Print' page, an attacker can access messages of other users, including admin-only messages.
A stored XSS vulnerability was discovered in WordPress Plugin Duplicate Page 4.4.1. An attacker can exploit this vulnerability by installing and activating the Duplicate Page plugin, navigating to Settings >> Duplicate Page and entering an XSS payload into the Duplicate Post Suffix input field. When the payload is triggered, the JavaScript payload is executed successfully and a pop-up is displayed.
There is an unauthorized access vulnerability, which can lead to unauthorized access to camera video screenshots. Payload: /mjpegStreamer.cgi
Has an unauthorized access vulnerability, which can lead to unauthorized access to the camera video page. Payload: /cgi-bin/view/index_MJpeg.cgi
There are unauthorized access vulnerabilities, which can lead to the disclosure of device administrator usernames and passwords or rstp usernames and passwords.
Some devices have unauthorized access to rstp, which can lead to the leakage of surveillance video stream information.
There is a backdoor prefabricated in the device in this path. Accessing the file through the browser after logging in will cause the device to delete all data (including the data of the camera itself). Payload:Visit this page after logging in /cgi-bin/support/killps.cgi
A SQL injection vulnerability exists in the Take Attendance functionality of OS4Ed's OpenSIS 8.0. allows an attacker to inject their own SQL query. The cp_id_miss_attn parameter from TakeAttendance.php is vulnerable to SQL injection. An attacker can make an authenticated HTTP request as a user with access to 'Take Attendance' functionality to trigger this vulnerability.