GeoVision Geowebserver 5.3.3 are vulnerable to several XSS / HTML Injection / Local File Include / XML Injection / Code execution vectors. The application fails to properly sanitize user requests. This allows injection of HTML code and XSS / client side exploitation, including session theft. Additionally, the vendor has issued an ineffective / broken patch which does not appear to remediate or address the problem. Versions 5.3.3 and below continue to be affected. This is acknowledged by the vendor. The devices are vulnerable to HOST HEADER POISONING and CROSS-SITE REQUEST FORGERY against the web application. These can be used for various vecors, including session hijacking.
COMMAX offers a wide range of proven AHD CCTV systems to meet customer needs and convenience in single or multi-family homes. The web control panel uses weak set of default administrative credentials that can be easily guessed in remote password attacks and disclose RTSP stream.
The application allows an unauthenticated attacker to change the configuration of the DVR arguments and/or cause denial-of-service scenario through the setconf endpoint.
The application suffers from an SQL Injection vulnerability. Input passed through the 'id' POST parameter in 'loginstart.asp' is not properly sanitised before being returned to the user or used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code and bypass the authentication mechanism.
The application suffers from an authentication bypass vulnerability. An unauthenticated attacker through cookie poisoning can bypass authentication and disclose sensitive information and circumvent physical controls in smart homes and buildings.
The Simple Water Refilling Station Management System is vulnerable to a SQL Injection because it fails to sufficiently sanitize user-supplied data before using it in a SQL query. Successful exploitation of this issue could allow an attacker to bypass the application's authentication controls and possibly access other sensitive data.
If any admin is logged on the router admin panel. if he/she try to connect any other SSID for Wireless Repeating Function. that time they need to check available SSID surrounding. that name is not sanitized properly before showing on the web's admin panel which leads to Stored XSS.
Multiple Stored Cross Site Scripting (Stored XSS) Vulnerability is found in the Short Name, Ip Origin, Key Code, Format Request and Owner fields within the admin api page of module of CentOS/ Control WebPanel when user tries to create a new API. This is because the application does not properly sanitize users input.
The authentication bypass vulnerability on the application allows an attacker to log in as Client. This vulnerability affects the 'username' parameter on the client login page: http://localhost/rates/login.php. On the login page, simply use the query inside the bracket ( ' OR 1 -- - ) as username and use same query{ ' OR 1 -- -} or anything as password to log in as Client.
Simple Image Gallery System 1.0 application is vulnerable to SQL injection via the 'id' parameter on the album page. An attacker can use boolean-based blind, error-based, and time-based blind payloads to exploit this vulnerability.