header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

ollama 0.6.4 – Server-Side Request Forgery (SSRF)

The ollama 0.6.4 application is vulnerable to Server-Side Request Forgery (SSRF) attack. An attacker can manipulate the 'from' parameter in the payload to make the server send requests to arbitrary hosts, potentially leading to unauthorized access to internal systems.

TaskFreak! Multiple Cross-Site Scripting Vulnerabilities

TaskFreak! is prone to multiple cross-site scripting vulnerabilities because the application fails to sufficiently sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.

TaskFreak! v0.6.4 Multiple Cross-Site Scripting Vulnerabilities

TaskFreak! suffers from multiple XSS vulnerabilities when parsing input to multiple parameters in different scripts. The vulnerable POST parameters are: 'sContext', 'sort', 'dir' and 'show' thru index.php. Also the GET parameters 'dir' and 'show' thru 'print_list.php' are vulnerable. Header variable 'referer' is vulnerable thru rss.php script. Attackers can exploit these weaknesses to execute arbitrary HTML and script code in a user's browser session.

Sahana Agasti <= 0.6.4 Multiple Remote File Include

Sahana Agasti version 0.6.4 and prior is vulnerable to multiple remote file include. This vulnerability allows an attacker to include a remote file, usually through a malicious URL, and execute arbitrary code on the vulnerable server. The vulnerable code can be found in sahana-phase2/mod/vm/controller/AccessController.php and sahana-phase2/mod/vm/model/dao.php, where the attacker can inject malicious code into the global[approot] parameter.

Sahana Agasti <= 0.6.4 SQL Injection Vulnerability

A SQL injection vulnerability exists in Sahana Agasti version 0.6.4. The vulnerability is due to the application not properly sanitizing user-supplied input to the 'sel' parameter of the 'xml.php' script. An attacker can exploit this vulnerability to inject and execute arbitrary SQL commands in the application's back-end database.

Recent Exploits: