Subscribe via feed.
Archive for May, 2022

http://thongfah.dit.go.th/krd.html

Posted by deepcore under defacement (No Respond)

http://thongfah.dit.go.th/krd.html notified by 1877

Tags:

http://blueflag.dit.go.th/krd.html

Posted by deepcore under defacement (No Respond)

http://blueflag.dit.go.th/krd.html notified by 1877

Tags:

https://lowpricemap.dit.go.th/krd.html

Posted by deepcore under defacement (No Respond)

https://lowpricemap.dit.go.th/krd.html notified by 1877

Tags:

Fast Food Ordering System 1.0 SQL Injection

Posted by deepcore under exploit (No Respond)

Fast Food Ordering System version 1.0 suffers from a remote SQL injection vulnerability.

Ingredient Stock Management System 1.0 SQL Injection

Posted by deepcore under exploit (No Respond)

Ingredient Stock Management System version 1.0 suffers from a remote blind SQL injection vulnerability.

Ingredient Stock Management System 1.0 Account Takeover

Posted by deepcore under exploit (No Respond)

Ingredient Stock Management System version 1.0 suffers from an account takeover vulnerability.

WordPress User Meta Lite / Pro 2.4.3 Path Traversal

Posted by deepcore under exploit (No Respond)

WordPress User Meta Lite and Pro plugin versions 2.4.3 and below suffer from a path traversal vulnerability.

Schneider Electric C-Bus Automation Controller (5500SHAC) 1.10 Remote Root

Posted by deepcore under exploit (No Respond)

Schneider Electric C-Bus Automation Controller (5500SHAC) version 1.10 suffers from an authenticated arbitrary command execution vulnerability. An attacker can abuse the Start-up (init) script editor and exploit the script POST parameter to insert malicious Lua script code and execute commands with root privileges that will grant full control of the device.

Schneider Electric C-Bus Automation Controller (5500SHAC) 1.10 Remote Root

Posted by deepcore under exploit (No Respond)

Schneider Electric C-Bus Automation Controller (5500SHAC) version 1.10 suffers from an authenticated arbitrary command execution vulnerability. An attacker can abuse the Start-up (init) script editor and exploit the script POST parameter to insert malicious Lua script code and execute commands with root privileges that will grant full control of the device.

https://loei2.go.th/1975.html

Posted by deepcore under defacement (No Respond)

https://loei2.go.th/1975.html notified by 1975 Team

Tags: