Subscribe via feed.
Archive for December, 2021

[webapps] Student Management System 1.0 – SQLi Authentication Bypass

Posted by deepcore under Security (No Respond)

Student Management System 1.0 – SQLi Authentication Bypass

Tags: ,

[webapps] TestLink 1.19 – Arbitrary File Download (Unauthenticated)

Posted by deepcore under Security (No Respond)

TestLink 1.19 – Arbitrary File Download (Unauthenticated)

Tags: ,

[webapps] Employees Daily Task Management System 1.0 – 'username' SQLi Authentication Bypass

Posted by deepcore under Security (No Respond)

Employees Daily Task Management System 1.0 – ‘username’ SQLi Authentication Bypass

Tags: ,

[webapps] Chikitsa Patient Management System 2.0.2 – 'backup' Remote Code Execution (RCE) (Authenticated)

Posted by deepcore under Security (No Respond)

Chikitsa Patient Management System 2.0.2 – ‘backup’ Remote Code Execution (RCE) (Authenticated)

Tags: ,

[webapps] Chikitsa Patient Management System 2.0.2 – Remote Code Execution (RCE) (Authenticated)

Posted by deepcore under Security (No Respond)

Chikitsa Patient Management System 2.0.2 – Remote Code Execution (RCE) (Authenticated)

Tags: ,

Simple Online Men's Salon Management System 1.0 SQL Injection

Posted by deepcore under exploit (No Respond)

Simple Online Men’s Salon Management System version 1.0 appears to suffer from a time-based remote SQL injection vulnerability.

HCL Lotus Notes 12 Unquoted Service Path

Posted by deepcore under exploit (No Respond)

HCL Lotus Notes version 12 suffers from an unquoted service path vulnerability.

Microsoft Internet Explorer Active-X Control Security Bypass

Posted by deepcore under exploit (No Respond)

Microsoft Internet Explorer suffers from an active-x related bypass vulnerability. Microsoft will not address the issue as it is end of life.

Croogo 3.0.2 Remote Code Execution

Posted by deepcore under exploit (No Respond)

Croogo version 3.0.2 suffers from an authenticated remote code execution vulnerability.

Auerswald COMfortel 1400/2600/3600 IP 2.8F Authentication Bypass

Posted by deepcore under exploit (No Respond)

RedTeam Pentesting discovered a vulnerability in the web-based configuration management interface of the Auerswald COMfortel 1400 and 2600 IP desktop phones. The vulnerability allows accessing configuration data and settings in the web-based management interface without authentication. Versions 2.8F and below are affected.