Tag
#auth
Zero day remote root exploit for IntelliNet version 2.0. It affects multiple devices of AES Corp and Siemens. The exploit provides a remote shell and escalates your permissions to full root permissions by abusing exec_suid. No authentication needed at all, neither any interaction from the victim. The firmware affected by this exploit runs on fire alarms, burglar sensors and environmental devices, all on the internet, all vulnerable, no patch. Full control over hardware and software with no restrictions, you can manipulate battery voltage and even damage the hardware with unknown outcomes.
Online Musical Instrument Shop IN version 1.0 suffers from a cross site scripting vulnerability.
Online Job Portal IN version 1.0 suffers from a remote SQL injection vulnerability.
pgAdmin versions 8.4 and earlier are affected by a remote reverse connection execution vulnerability via the binary path validation API.
SPIP version 4.2.7 suffers from a code execution vulnerability.
Loan Management System 2024 version 1.0 suffers from an ignored default credential vulnerability.
Hostel Management System version 1.0 version 1.0 suffers from an arbitrary file upload vulnerability.
File Management System version 1.0 suffers from a cross site request forgery vulnerability.
Faculty Evaluation System version 1.0 suffers from a cross site request forgery vulnerability.
eClass LMS version 6.2.0 suffers from a remote shell upload vulnerability.