header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

ERPNext 12.14.0 – SQL Injection (Authenticated)

Found an authenticated SQL injection when authenticated as a low-privileged user as the parameters 'or_filter' and 'filters' are not being sanitized sufficiently. Although several sanitation and blacklist attempts are used in the code for other parameters, these parameters aren't checked. This allows, for example, a retrieval of the admin reset token and reset the admin account using a new password as being shown in the PoC.

CASAP Automated Enrollment System 1.0 – Authentication Bypass

CASAP Automated Enrollment System 1.0 is vulnerable to authentication bypass. An attacker can exploit this vulnerability by setting a cookie and sending a POST request with a username of 'or 1 or' and a blank password. If successful, the attacker will be able to access the dashboard without authentication.

Library System 1.0 – Authentication Bypass Via SQL Injection

Library System 1.0 is vulnerable to authentication bypass via SQL injection. An attacker can exploit this vulnerability by sending a specially crafted SQL query to the application. This will allow the attacker to bypass the authentication and gain access to the student area.

Oracle WebLogic Server 14.1.1.0 – RCE (Authenticated)

A vulnerability in Oracle WebLogic Server could allow an authenticated, remote attacker to execute arbitrary code on the targeted system. The vulnerability is due to improper validation of user-supplied input by the affected software. An attacker could exploit this vulnerability by sending a crafted request to the targeted system. A successful exploit could allow the attacker to execute arbitrary code on the targeted system with the privileges of the WebLogic server.

Selea Targa IP OCR-ANPR Camera Unauthenticated SSRF

An unauthenticated Server-Side Request Forgery (SSRF) vulnerability exists in the Selea ANPR camera within several functionalities. The application parses user supplied URLs and makes requests to them without any validation. This allows an attacker to make requests to internal services, such as the camera's web server, and possibly gain access to sensitive information.

Selea Targa IP OCR-ANPR Camera Unauthenticated Directory Traversal File Disclosure

The ANPR camera suffers from an unauthenticated arbitrary file disclosure vulnerability. Input passed through the 'file' parameter in the 'get_file.cgi' script is not properly sanitized before being used to read files. This can be exploited to read arbitrary files from the underlying file system with the privileges of the web server process.

Recent Exploits: