header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

CBAS-Web 19.0.0 – Username Enumeration

CBAS-Web 19.0.0 is vulnerable to username enumeration. An attacker can send a POST request to the /cbas/index.php?m=auth&a=login endpoint with a valid username and an empty password. If the username is valid, the response will contain an error message indicating that the username/password combination is invalid. If the username is invalid, the response will contain the username in an error message.

CBAS-Web 19.0.0 – Remote Code Execution

CBAS-Web Unauthenticated Remote Command Injection Exploit is a vulnerability that affects versions 19.0.0 and below. It uses two vulnerabilities for executing commands: an authorization bypass in the auth module (CVE-2019-10853) and a code execution vulnerability in the json.php endpoint (CVE-2019-10854).

eMerge E3 Access Controller 4.6.07 – Remote Code Execution

A vulnerability in the eMerge E3 Access Controller 4.6.07 allows an attacker to gain root access to the system by exploiting a vulnerability in the SSH protocol. The vulnerability can be exploited by sending a specially crafted SSH packet to the target system. Once the packet is received, the attacker can gain root access to the system.

eMerge E3 1.00-06 – ‘layout’ Reflected Cross-Site Scripting

eMerge E3 1.00-06 is vulnerable to Reflected Cross-Site Scripting (XSS) when the 'layout' parameter is supplied with malicious JavaScript code. An attacker can exploit this vulnerability by tricking an authenticated user into clicking a malicious link. The malicious link contains the malicious JavaScript code in the 'layout' parameter. When the user clicks the link, the malicious code is executed in the user's browser.

eMerge E3 1.00-06 – Arbitrary File Upload

An arbitrary file upload vulnerability exists in eMerge E3 1.00-06. An attacker can exploit this vulnerability to upload a malicious file and execute arbitrary code on the server. This vulnerability is due to insufficient validation of the file type when uploading a file. An attacker can exploit this vulnerability by sending a malicious file with a double extension such as .php.jpg. This will bypass the validation and allow the attacker to upload the malicious file.

eMerge E3 1.00-06 – Cross-Site Request Forgery

Nortek Linear eMerge E3 Access Control Cross-Site Request Forgery is a vulnerability that allows an attacker to perform malicious actions on behalf of a legitimate user. This vulnerability can be exploited by sending a maliciously crafted request to the vulnerable system. The malicious request can be used to add a super user, change the admin password, or perform other malicious actions.

eMerge E3 1.00-06 – Remote Code Execution

An unauthenticated attacker can execute arbitrary code on the eMerge E3 1.00-06 system by sending a specially crafted HTTP request to the card_scan.php page. This vulnerability is due to insufficient input validation of the No and ReaderNo parameters. An attacker can exploit this vulnerability by sending a malicious HTTP request to the vulnerable system.

eMerge E3 1.00-06 – Privilege Escalation

eMerge E3 1.00-06 is vulnerable to privilege escalation. An attacker can exploit this vulnerability by sending a malicious POST request to the web server. This request will add a new user with administrator privileges. An attacker can also disclose the existing users by sending a malicious GET request to the web server.

Recent Exploits: