header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Selea Targa IP OCR-ANPR Camera – ‘files_list’ Remote Stored XSS

The application suffers from a stored XSS through a POST request. The issue is triggered when input passed to the 'files_list' parameter is not properly sanitized befoer being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

Selea CarPlateServer (CPS) 4.0.1.6 – Local Privilege Escalation

The application suffers from an unquoted search path issue impacting the service 'Selea CarPlateServer' for Windows deployed as part of Selea CPS software application. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system. A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Selea CarPlateServer (CPS) 4.0.1.6 – Remote Program Execution

The server suffers from an arbitrary win32/64 binary executable execution when setting the NO_LIST_EXE_PATH variable to a program of choice. The command will be executed if proper trigger criteria is met. It can be exploited via CSRF or by navigating to /cps/ endpoint from the camera IP and bypass authentication gaining the ability to modify the running configuration including changing the password of admin and other users.

Anchor CMS 0.12.7 – CSRF (Delete user)

Anchor CMS 0.12.7 is vulnerable to Cross-Site Request Forgery (CSRF) which allows an attacker to delete a user by sending a malicious link to the admin. The malicious link contains the user id of the user to be deleted. When the admin clicks on the link, the user with the specified id is deleted.

Nagios XI 5.7.5 – Multiple Persistent Cross-Site Scripting

A persistent cross-site scripting vulnerability exists in the 'My Tools' and 'Business Process Intelligence' functionalities of Nagios XI. The vulnerable parameters are 'url' and 'groupID' respectively. An attacker can create a tool or BPI group with an XSS payload and click on the URL link or Group ID to trigger the payload.

Apartment Visitors Management System 1.0 – ’email’ SQL Injection

Apartment Visitors Management System 1.0 is vulnerable to a time-based blind SQL injection in the 'email' parameter. An attacker can send a malicious payload to the 'email' parameter to execute arbitrary SQL commands on the underlying database. The payload used in the proof-of-concept is 'email=test@gmail.com' AND (SELECT 2600 FROM (SELECT(SLEEP(5)))jpeB) AND 'WVFv'='WVFv&contactno=1&submit=

Oracle Business Intelligence Enterprise Edition 11.1.1.7.140715 – Stored XSS

A stored XSS vulnerability exists in Oracle Business Intelligence Enterprise Edition 11.1.1.7.140715. An attacker can inject malicious JavaScript code into the Dashboard - Add New Text area, which will be executed when the page is loaded by a victim.

osTicket 1.14.2 – SSRF

osTicket before 1.14.3 suffers from Server Side Request Forgery (SSRF). HTML page is rendered on backend server on calling 'Print' ticket functionality. An attacker can create a new ticket, select 'HTML Format' format, add an image tag with malicious payload in src attribute and print the ticket. This will result in a hit on the malicious website from the internal server on which osTicket is deployed.

Recent Exploits: