Security
Headlines
HeadlinesLatestCVEs

Source

Zero Science Lab

MiniDVBLinux 5.4 Arbitrary File Read Vulnerability

The distribution suffers from an arbitrary file disclosure vulnerability. Using the 'file' GET parameter attackers can disclose arbitrary files on the affected device and disclose sensitive and system information.

Zero Science Lab
#vulnerability#web#linux#git
MiniDVBLinux 5.4 Remote Root Command Execution Vulnerability

The application suffers from an OS command execution vulnerability. This can be exploited to execute arbitrary commands as root, through the 'command' GET parameter in /tpl/commands.sh.

MiniDVBLinux 5.4 Remote Root Command Injection Vulnerability

The application suffers from an OS command injection vulnerability. This can be exploited to execute arbitrary commands with root privileges.

MiniDVBLinux 5.4 Unauthenticated Stream Disclosure Vulnerability

The application suffers from an unauthenticated live stream disclosure when /tpl/tv_action.sh is called and generates a snapshot in /var/www/images/tv.jpg through the Simple VDR Protocol (SVDRP).

MiniDVBLinux 5.4 Change Root Password PoC

The application allows a remote attacker to change the root password of the system without authentication (disabled by default) and verification of previously assigned credential. Command execution also possible using several POST parameters.

MiniDVBLinux 5.4 Simple VideoDiskRecorder Protocol SVDRP (svdrpsend.sh) Exploit

The application allows the usage of the SVDRP protocol/commands to be sent by a remote attacker to manipulate and/or control remotely the TV.

MiniDVBLinux 5.4 Config Download Exploit

The application is vulnerable to unauthenticated configuration download when direct object reference is made to the backup function using an HTTP GET request. This will enable the attacker to disclose sensitive information and help her in authentication bypass, privilege escalation and full system access.

SoX 14.4.2 (wav.c) Division By Zero

SoX suffers from a division by zero attack when handling WAV files, resulting in denial of service vulnerability and possibly loss of data.

ETAP Safety Manager 1.0.0.32 Remote Unauthenticated Reflected XSS

Input passed to the GET parameter 'action' is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML/JS code in a user's browser session in context of an affected site.

Schneider Electric SpaceLogic C-Bus Home Controller (5200WHC2) Remote Root Exploit

The home automation solution suffers from an authenticated OS command injection vulnerability. This can be exploited to inject and execute arbitrary shell commands as the root user via the 'name' GET parameter in 'delsnap.pl' Perl/CGI script which is used for deleting snapshots taken from the webcam.