header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

GeoVision Geowebserver 5.3.3 – LFI / XSS / HHI / RCE

GeoVision Geowebserver 5.3.3 are vulnerable to several XSS / HTML Injection / Local File Include / XML Injection / Code execution vectors. The application fails to properly sanitize user requests. This allows injection of HTML code and XSS / client side exploitation, including session theft. Additionally, the vendor has issued an ineffective / broken patch which does not appear to remediate or address the problem. Versions 5.3.3 and below continue to be affected. This is acknowledged by the vendor. The devices are vulnerable to HOST HEADER POISONING and CROSS-SITE REQUEST FORGERY against the web application. These can be used for various vecors, including session hijacking.

COMMAX CVD-Axx DVR 5.1.4 – Weak Default Credentials Stream Disclosure

COMMAX offers a wide range of proven AHD CCTV systems to meet customer needs and convenience in single or multi-family homes. The web control panel uses weak set of default administrative credentials that can be easily guessed in remote password attacks and disclose RTSP stream.

COMMAX Smart Home IoT Control System CDP-1020n – SQL Injection Authentication Bypass

The application suffers from an SQL Injection vulnerability. Input passed through the 'id' POST parameter in 'loginstart.asp' is not properly sanitised before being returned to the user or used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code and bypass the authentication mechanism.

COMMAX Biometric Access Control System 1.0.0 – Authentication Bypass

The application suffers from an authentication bypass vulnerability. An unauthenticated attacker through cookie poisoning can bypass authentication and disclose sensitive information and circumvent physical controls in smart homes and buildings.

Simple Water Refilling Station Management System 1.0 – Authentication Bypass

The Simple Water Refilling Station Management System is vulnerable to a SQL Injection because it fails to sufficiently sanitize user-supplied data before using it in a SQL query. Successful exploitation of this issue could allow an attacker to bypass the application's authentication controls and possibly access other sensitive data.

NetGear D1500 V1.0.0.21_1.0.1PE – ‘Wireless Repeater’ Stored Cross-Site Scripting (XSS)

If any admin is logged on the router admin panel. if he/she try to connect any other SSID for Wireless Repeating Function. that time they need to check available SSID surrounding. that name is not sanitized properly before showing on the web's admin panel which leads to Stored XSS.

CentOS Web Panel 0.9.8.1081 – Stored Cross-Site Scripting (XSS)

Multiple Stored Cross Site Scripting (Stored XSS) Vulnerability is found in the Short Name, Ip Origin, Key Code, Format Request and Owner fields within the admin api page of module of CentOS/ Control WebPanel when user tries to create a new API. This is because the application does not properly sanitize users input.

RATES SYSTEM 1.0 – Authentication Bypass

The authentication bypass vulnerability on the application allows an attacker to log in as Client. This vulnerability affects the 'username' parameter on the client login page: http://localhost/rates/login.php. On the login page, simply use the query inside the bracket ( ' OR 1 -- - ) as username and use same query{ ' OR 1 -- -} or anything as password to log in as Client.

Simple Image Gallery System 1.0 – ‘id’ SQL Injection

Simple Image Gallery System 1.0 application is vulnerable to SQL injection via the 'id' parameter on the album page. An attacker can use boolean-based blind, error-based, and time-based blind payloads to exploit this vulnerability.

Recent Exploits: