header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

ECOA Building Automation System – Missing Encryption Of Sensitive Information

The ECOA Building Automation System suffers from a vulnerability where sensitive information is not encrypted. This vulnerability allows an attacker to potentially intercept and access sensitive data transmitted over the network.

ECOA Building Automation System – Hard-coded Credentials SSH Access

The ECOA Building Automation System has hard-coded credentials for SSH access. This allows unauthorized users to gain access to the system and potentially control and monitor the facilities. The affected products include ECOA ECS Router Controller - ECS (FLASH), ECOA RiskBuster Terminator - E6L45, ECOA RiskBuster System - RB 3.0.0, ECOA RiskBuster System - TRANE 1.0, ECOA Graphic Control Software, ECOA SmartHome II - E9246, and ECOA RiskTerminator.

ECOA Building Automation System – Directory Traversal Content Disclosure

The ECOA Building Automation System is vulnerable to directory traversal, allowing an attacker to disclose sensitive content from the system. This vulnerability affects various ECOA products including ECOA ECS Router Controller - ECS (FLASH), ECOA RiskBuster Terminator - E6L45, ECOA RiskBuster System - RB 3.0.0, ECOA RiskBuster System - TRANE 1.0, ECOA Graphic Control Software, ECOA SmartHome II - E9246, and ECOA RiskTerminator. The Risk-Terminator Web Graphic control BEMS and RiskBuster Router Server are both affected. By exploiting this vulnerability, an attacker can gain unauthorized access to sensitive information and potentially compromise the system's security.

ECOA Building Automation System – Weak Default Credentials

The ECOA Building Automation System is vulnerable to weak default credentials, which can be exploited by an attacker to gain unauthorized access to the system. The affected products include ECOA ECS Router Controller - ECS (FLASH), ECOA RiskBuster Terminator - E6L45, ECOA RiskBuster System - RB 3.0.0, ECOA RiskBuster System - TRANE 1.0, ECOA Graphic Control Software, ECOA SmartHome II - E9246, and ECOA RiskTerminator.

FlatCore CMS 2.0.7 – Remote Code Execution (RCE) (Authenticated)

This exploit allows an authenticated attacker to execute arbitrary code on a target system running FlatCore CMS version 2.0.7. The vulnerability exists in the 'files.upload-script.php' script, which allows an attacker to upload a malicious PHP file and execute arbitrary commands through the 'sg' parameter in the URL.

Recent Exploits: