Text Exploits
31,346 exploits tracked across all sources.
Heatmiser Netmonitor 3.03 - Hardcoded Credentials
Heatmiser Netmonitor 3.03 contains a hardcoded credentials vulnerability in the networkSetup.htm page with predictable admin login credentials. Attackers can access the device by using the hard-coded username 'admin' and password 'admin' in the hidden form input fields.
by Ismail Tasdelen
CVSS 7.5
E Learning Script 1.0 - Auth Bypass
E Learning Script 1.0 contains an authentication bypass vulnerability that allows attackers to access the dashboard without valid credentials by manipulating login parameters. Attackers can exploit the /login.php file by sending a specific payload '=''or' to bypass authentication and gain unauthorized access to the system.
by riamloo
CVSS 6.5
Homeautomation - Authentication Bypass by Spoofing
HomeAutomation 3.3.2 suffers from an authentication bypass vulnerability when spoofing client IP address using the X-Forwarded-For header with the local (loopback) IP address value allowing remote control of the smart home solution.
by LiquidWorm
CVSS 9.8
Homeautomation - CSRF
HomeAutomation 3.3.2 suffers from an authenticated OS command execution vulnerability using custom command v0.1 plugin. This can be exploited with a CSRF vulnerability to execute arbitrary shell commands as the web user via the 'set_command_on' and 'set_command_off' POST parameters in '/system/systemplugins/customcommand/customcommand.plugin.php' by using an unsanitized PHP exec() function.
by LiquidWorm
CVSS 8.0
AVE Dominaplus < 1.10.77 - Missing Authentication
AVE DOMINAplus <=1.10.x suffers from an unauthenticated reboot command execution. Attackers can exploit this issue to cause a denial of service scenario.
by LiquidWorm
CVSS 7.5
AVE Dominaplus < 1.10.77 - Insufficiently Protected Credentials
AVE DOMINAplus <=1.10.x suffers from clear-text credentials disclosure vulnerability that allows an unauthenticated attacker to issue a request to an unprotected directory that hosts an XML file '/xml/authClients.xml' and obtain administrative login information that allows for a successful authentication bypass attack.
by LiquidWorm
CVSS 9.8
AVE Dominaplus < 1.10.77 - Authentication Bypass
AVE DOMINAplus <=1.10.x suffers from an authentication bypass vulnerability due to missing control check when directly calling the autologin GET parameter in changeparams.php script. Setting the autologin value to 1 allows an unauthenticated attacker to permanently disable the authentication security control and access the management interface with admin privileges without providing credentials.
by LiquidWorm
CVSS 9.8
Domoticz Mydomoathome - Incorrect Authorization
Emmanuel MyDomoAtHome (MDAH) REST API REST API Domoticz ISS Gateway 0.2.40 is affected by an information disclosure vulnerability due to improper access control enforcement. An unauthenticated remote attacker can exploit this, via a specially crafted request to gain access to sensitive information.
by LiquidWorm
CVSS 7.5
Homeautomation - CSRF
HomeAutomation 3.3.2 is affected by Cross Site Request Forgery (CSRF). The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.
by LiquidWorm
CVSS 8.8
Homeautomation - XSS
HomeAutomation 3.3.2 is affected by persistent Cross Site Scripting (XSS). XSS vulnerabilities occur when input passed via several parameters to several scripts is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session.
by LiquidWorm
CVSS 6.1
Wing FTP Server 6.0.7 - Privilege Escalation
Wing FTP Server 6.0.7 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code with elevated system privileges. Attackers can exploit the unquoted binary path in the service configuration to inject malicious executables that will be launched with LocalSystem permissions.
by Nawaf Alkeraithe
CVSS 7.8
AVE DOMINAplus <1.10.x - XSS, CSRF
AVE DOMINAplus 1.10.x contains cross-site request forgery and cross-site scripting vulnerabilities that allow attackers to perform administrative actions without user consent. Attackers can craft malicious web pages to exploit login.php parameters and execute arbitrary scripts in user browser sessions.
by LiquidWorm
CVSS 5.3
XEROX WorkCentre 7855 Printer - Cross-Site Request Forgery (Add Admin)
by Ismail Tasdelen
XEROX WorkCentre 7830 Printer - Cross-Site Request Forgery (Add Admin)
by Ismail Tasdelen
XEROX WorkCentre 6655 Printer - Cross-Site Request Forgery (Add Admin)
by Ismail Tasdelen
phpMyChat-Plus 1.98 - 'pmc_username' Reflected Cross-Site Scripting
by Chris Inzinga
Deutsche Bahn Ticket Vending Machine Local Kiosk - Privilege Escalation
by Vulnerability-Lab
Tautulli 2.1.9 - Cross-Site Request Forgery (ShutDown)
by Ismail Tasdelen
macOS 10.14.6 (18G87) - Kernel Use-After-Free due to Race Condition in wait_for_namespace_event()
by Google Security Research
Xerox AltaLink C8035 Printer - Cross-Site Request Forgery (Add Admin)
by Ismail Tasdelen
Telerik UI ASP.NET AJAX RadAsyncUpload Deserialization
Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deserialization vulnerability in the RadAsyncUpload function. This is exploitable when the encryption keys are known due to the presence of CVE-2017-11317 or CVE-2017-11357, or other means. Exploitation can result in remote code execution. (As of 2020.1.114, a default setting prevents the exploit. In 2019.3.1023, but not earlier versions, a non-default setting can prevent exploitation.)
by Bishop Fox
CVSS 9.8
Rumpus FTP Web File Manager 8.2.9.1 - XSS
A Reflected Cross Site Scripting was discovered in the Login page of Rumpus FTP Web File Manager 8.2.9.1. An attacker can exploit it by sending a crafted link to end users and can execute arbitrary Javascripts
by Harshit Shukla
CVSS 6.1
By Source