header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Exponent CMS 2.6 – Multiple Vulnerabilities

Exponent CMS 2.6 is vulnerable to Stored XSS, Database Credential Disclosure, and Authentication Bruteforce. An attacker can inject malicious code into the 'http://127.0.0.1:8082/expcms/text/edit/id/{id}/src/@footer' parameter to execute arbitrary code. Database credentials are disclosed in the response. An attacker can also brute force the authentication credentials using the provided python script.

phpKF CMS 3.00 Beta y6 – Remote Code Execution (RCE) (Unauthenticated)

phpKF-CMS is a very popular content management system for promotion, news, shopping, corporate, friends, blogs and more. It contains an endpoint that allows remote access. Necessary checks are not made in the file upload mechanism, only the file extension is checked. The file with the extension '.png' can be uploaded and the extension can be changed.

WBCE CMS 1.5.1 – Admin Password Reset

An attacker can exploit a SQL injection vulnerability in WBCE CMS version 1.5.1 to reset the administrator password. The attacker can send a specially crafted HTTP POST request to the vulnerable URL with the email address set to 'admin@domain.com' and a random value for the submit parameter. This will cause the application to send a plaintext password to the attacker's email address.

Croogo 3.0.2 – Unrestricted File Upload

Croogo 3.0.2 is vulnerable to an unrestricted file upload vulnerability. An attacker can upload a malicious PHP script and execute it by accessing the '/uploads/(NAME).php' directory. The malicious script can be uploaded by sending a POST request to the '/admin/settings/settings/prefix/Theme' endpoint.

Cibele Thinfinity VirtualUI 2.5.41.0 – User Enumeration

By accessing the vector, an attacker can determine if a username exists thanks to the message returned; it can be presented in different languages according to the configuration of VirtualUI. Common users are administrator, admin, guest... The vulnerable vector is 'https://example.com/changePassword?username=USERNAME' where 'USERNAME' need to be brute-forced.

Oliver Library Server v5 – Arbitrary File Download

An arbitrary file download vulnerability in Oliver v5 Library Server Versions < 8.00.008.053 via the FileServlet function allows for arbitrary file download by an attacker using unsanitized user supplied input.

Microsoft Internet Explorer / ActiveX Control – Security Bypass

An attacker can craft a malicious MHT file containing an invalid Content-Location header directive, which when opened on disk with Internet Explorer will bypass ActiveX control warnings and popup blocker privacy settings.

Recent Exploits: