Elber Tavares

9 exploits Active since Sep 2017
CVE-2017-15381 EXPLOITDB CRITICAL text WORKING POC
Softwarepublico E-sic - SQL Injection
SQL Injection exists in E-Sic 1.0 via the f parameter to esiclivre/restrito/inc/buscacep.php (aka the zip code search script).
CVSS 9.8
CVE-2017-15380 EXPLOITDB MEDIUM text WORKING POC
Softwarepublico E-sic - XSS
XSS exists in the E-Sic 1.0 /cadastro/index.php URI (aka the requester's registration area) via the nome parameter.
CVSS 6.1
CVE-2017-15379 EXPLOITDB CRITICAL text WORKING POC
Softwarepublico E-sic - SQL Injection
An authentication bypass exists in the E-Sic 1.0 /index (aka login) URI via '=''or' values for the username and password.
CVSS 9.8
CVE-2017-15378 EXPLOITDB HIGH text WORKING POC
Softwarepublico E-sic - SQL Injection
SQL Injection exists in the E-Sic 1.0 password reset parameter (aka the cpfcnpj parameter to the /reset URI).
CVSS 8.8
CVE-2017-14942 EXPLOITDB CRITICAL python WORKING POC
Intelbras WRN 150 - Authentication Bypass
Intelbras WRN 150 devices allow remote attackers to read the configuration file, and consequently bypass authentication, via a direct request for cgi-bin/DownloadCfg/RouterCfm.cfg containing an admin:language=pt cookie.
CVSS 9.8
CVE-2019-19142 EXPLOITDB HIGH text WORKING POC
Intelbras WRN240 - DoS
Intelbras WRN240 devices do not require authentication to replace the firmware via a POST request to the incoming/Firmware.cfg URI.
CVSS 7.5
CVE-2020-9374 EXPLOITDB CRITICAL python WORKING POC
Tp-link Tl-wr849n Firmware - OS Command Injection
On TP-Link TL-WR849N 0.9.1 4.16 devices, a remote command execution vulnerability in the diagnostics area can be exploited when an attacker sends specific shell metacharacters to the panel's traceroute feature.
CVSS 9.8
CVE-2019-19143 EXPLOITDB MEDIUM text WORKING POC
TP-LINK TL-WR849N <4.16 - DoS
TP-LINK TL-WR849N 0.9.1 4.16 devices do not require authentication to replace the firmware via a POST request to the cgi/softup URI.
CVSS 6.1
CVE-2017-14219 EXPLOITDB MEDIUM text WORKING POC
Intelbras Wireless N 150Mbps router WRN 240 - XSS
XSS (persistent) on the Intelbras Wireless N 150Mbps router with firmware WRN 240 allows attackers to steal wireless credentials without being connected to the network, related to userRpm/popupSiteSurveyRpm.htm and userRpm/WlanSecurityRpm.htm. The attack vector is a crafted ESSID, as demonstrated by an "airbase-ng -e" command.
CVSS 6.1