header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Java RMI Server Insecure Default Configuration Java Code Execution

This module takes advantage of the default configuration of the RMI Registry and RMI Activation services, which allow loading classes from any remote (HTTP) URL. As it invokes a method in the RMI Distributed Garbage Collector which is available via every RMI endpoint, it can be used against both rmiregistry and rmid, and against most other (custom) RMI endpoints as well. Note that it does not work against Java Management Extension (JMX) ports since those do not support remote class loading, unless another RMI endpoint is active in the same Java process. RMI method calls do not support or require any sort of authentication.

PG eLMS Pro vDEC_2007_01 Multiple Blind SQL Injection Vulnerabilities

Input passed via the 'lang_code' GET parameter to index.php and login.php in '/www/core/language.class.php', and 'login' POST parameter to login.php is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

PG eLMS Pro vDEC_2007_01 (contact_us.php) Multiple POST XSS Vulnerabilities

Input passed via the 'subject', 'name', 'email' and 'body' parameters to 'contact_us.php' script is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

TCExam <=11.2.011 Multiple SQL Injection Vulnerabilities

Input passed via multiple parameters to multiple scripts is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

LiteRadius <= 3.2 - Multiple Blind SQL Injection vulnerabilities

LiteRadius is vulnerable to multiple Blind SQL Injection vulnerabilities. Attackers can exploit these vulnerabilities by sending maliciously crafted requests to the vulnerable application. This can allow attackers to gain access to sensitive information stored in the database, such as usernames and passwords. The PoC provided shows how an attacker can exploit this vulnerability by sending a maliciously crafted request to the vulnerable application.

Pandora FMS v3.2.1 Cross Site Request Forgery

In the page of 'http://127.0.0.1/pandora_console/index.php?sec=usuarios&sec2=operation/users/user_edit' we can submit the parameters : password_new ; password_conf ; phone ; fullname ; e-mail with POST request. We can exploit it by sending crafted html page to the administrator (The connected privileged user) with customized values. To patch this vulnerability the developpers must integrate an anti-bot system like CAPTCHA in the application.

Recent Exploits: