The FLIR Brickstream 3D+ sensor is vulnerable to unauthenticated and unauthorized live RTSP video stream access.
The FLIR AX8 thermal sensor camera suffers an unauthenticated and unauthorized live RTSP video stream access. An attacker can use tools such as cvlc, ffmpeg, ffplay, and wget to access the RTSP stream and freeze the stream using a POST request to the res.php file.
All users can run sql injection codes. The vulnerability exists in the 'nomor' parameter of the log_activity() function in the User.php file. An attacker can send a malicious HTTP POST request with a payload in the 'nomor' parameter to execute arbitrary SQL commands on the underlying database.
Advanced HRM 1.6 allows users to upload arbitrary files which leads to a remote command execution on the remote server. An attacker can create a php file with malicious code and upload it to the server. Then, the attacker can access the file via the URL and execute the malicious code.
College Notes Management System 1.0 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP POST request to the login.php page. The application does not properly sanitize user-supplied input before using it in an SQL query. This can be exploited to manipulate the SQL query by injecting arbitrary SQL code. Successful exploitation of this vulnerability can allow an attacker to gain access to the application database.
The FLIR AX8 thermal sensor camera suffers from two unauthenticated command injection vulnerabilities. The issues can be triggered when calling multiple unsanitized HTTP GET/POST parameters within the shell_exec function in res.php and palette.php file. This can be exploited to inject arbitrary system commands and gain root remote code execution.
New admin can be added by sending a GET request to the user.php page with the parameters act=insert, use_id, use_name, rol_id, and password.
The FLIR Brickstream 3D+ sensor is vulnerable to unauthenticated config download and file disclosure vulnerability when calling the ExportConfig REST API (getConfigExportFile.cgi). This will enable the attacker to disclose sensitive information and help her in authentication bypass, privilege escalation and/or full system access.
A SQL injection vulnerability exists in Academic Timetable Final Build 7.0a-7.0b, which allows an attacker to inject malicious SQL queries via the 'id' parameter in the timetable_pdf_content.php file. An attacker can use this vulnerability to gain access to sensitive information from the database, such as usernames and passwords.
A vulnerability in uploader.swf, io.swf and flashcanvas.swf in SugarCRM Community Edition 6.5.26 could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack on a targeted system. SugarCRM Community Edition 6.5 had reached its end-of-life and is no longer supported. 6.5.26 is the last version and no patches will be provided by the vendor.