August 20, 2024Event Registration and Attendance System 1.0 Code Injection

Event Registration and Attendance System version 1.0 suffers from a code injection vulnerability.

August 19, 2024Ewon Cosy+ Password Disclosure

The Ewon Cosy+ is a VPN gateway used for remote access and maintenance in industrial environments. The credentials used for the basic authentication against the web interface of Cosy+ are stored in the cookie "credentials" after a successful login. An att

August 19, 2024Ewon Cosy+ Improper Neutralization / Cross Site Scripting

The Ewon Cosy+ is a VPN gateway used for remote access and maintenance in industrial environments. If login against the FTP service of the Cosy+ fails, the submitted username is saved in a log. This log is included in the Cosy+ web interface without neutr

August 19, 2024Lawyer CMS 1.6 Insecure Settings

Lawyer CMS version 1.6 suffers from an ignored default credential vulnerability.

August 19, 2024Karya Online Shopping Portal 2.0 SQL Injection

Karya Online Shopping Portal version 2.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

August 19, 2024JobSeeker CMS 1.5 Insecure Settings

JobSeeker CMS version 1.5 suffers from an ignored default credential vulnerability.

August 19, 2024Jobs Finder System 1.0 SQL Injection

Jobs Finder System version 1.0 suffers from a remote SQL injection vulnerability.

August 19, 2024Human Resource Management System 2024 1.0 Insecure Settings

Human Resource Management System 2024 version 1.0 suffers from an ignored default credential vulnerability.

August 19, 2024Hotel Management System 1.0 Cross Site Request Forgery

Hotel Management System version 1.0 suffers from a cross site request forgery vulnerability.

August 19, 2024Bhojon Restaurant Management System 3.0 Insecure Settings

Bhojon Restaurant Management System version 3.0 suffers from an ignored default credential vulnerability.

Archives
Categories
  • All Exploits 4095
  • Remote Code Execution
  • SQL Injection
  • Command Injection
  • Local File Inclusion
  • Cross Site Scripting
  • Privilege Escalation
  • Denial Of Service
  • Authentication Bypass
  • Buffer Overflow