header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

JAKCMS 2.0 PRO RC5 stored XSS via useragent HTTP header Injection

An attacker can exploit this vulnerability since using an intercepting proxy, where an attacker can modify the 'user-agent HTTP header' the Header is displayed and stored unsanitized in the admin logs on failed and successful logins.

T-Content Managment Multiple Vulnerability

A vulnerability in T-Content Managment allows an attacker to bypass authentication by using the user 'admin' or 1=1-- and the password ' or 1=1--. Additionally, an attacker can edit images and content by using the URLs http://path/admin/galerias/admin_fotos.php?id_tipo=0&id_relacionado=0&nombre=Novedades and http://path/admin/admin/novedades/inc_listado.php?orden=titulo respectively. Furthermore, an attacker can exploit a SQL injection vulnerability by using the URL http://path/notaevento.php?id_novedad=-1+UNION+SELECT+1,2,3,4+from+admin--.

Trustwave’s SpiderLabs Security Advisory TWSL2011-002: Vulnerabilities in Comcast DOCSIS 3.0 Business Gateways (D3G-CCR)

All D3G-CCR gateways provided by Comcast have an administrative login of 'mso' with the password of 'D0nt4g3tme'. These passwords are not provided as a part of the installation of the device and are not recommended to be changed, thus the majority of users are unaware of the default configuration. With these default credentials, internal attackers can modify device configurations to leverage more significant attacks, including redirection of DNS requests, creation of a remote VPN termination point, and modification of NAT entries. D3G-CCR gateways provided by Comcast permit CSRF attacks against numerous management pages allowing an attacker to embed in a webpage a malicious request against the gateway's management interface. Through this, an attacker can modify device configuration and enable remote administration via a telnet shell and http.

Dew-NewPHPLinks v.2.1b (index.php) Sql Injection Vulnerability

An attacker can exploit this vulnerability by sending a crafted SQL query to the vulnerable application. This can be done by appending the malicious SQL query to the vulnerable parameter in the URL. This can allow the attacker to gain access to the database and execute arbitrary commands.

Hanso Converter v1.1.0 Language File Buffer Overflow – Denial OF Service

A buffer overflow vulnerability exists in Hanso Converter v1.1.0 when a specially crafted XML file is opened. An attacker can exploit this vulnerability to cause a denial of service condition. The vulnerability is due to a lack of proper validation of user-supplied data when parsing the XML file. An attacker can exploit this vulnerability by creating a malicious XML file and convincing the user to open it.

Exploit Title: Escort und Begleitservice Agentur Script SQL Injection

The vulnerability exists due to insufficient filtration of user-supplied input in 'custid' parameter in 'show_profile.php' script. A remote attacker can execute arbitrary SQL commands in application's database and gain access to sensitive data.

Qcodo Development Framework 0.3.3 Full Info Disclosure

This exploit allows an attacker to gain access to the server, database, username and password of a vulnerable Qcodo Development Framework 0.3.3 installation. The exploit works by exploiting a vulnerability in the codegen.php file, which allows an attacker to access the server, database, username and password of the vulnerable installation.

Chamilo 1.8.7 / Dokeos 1.8.6 Remote File Disclosure

Two file disclosure flaws exists on these LMS platforms, which could allow an attacker registered on the system to obtain files from the server, i.e your database configuration file, or any other file readeable by the webserver. The user input to the $_GET['file'] variable was not been cleaned at all, and used to open a file and send it to the browser of the user, it only required to be registered and subscribed to a course. The user input on $_GET['doc_url'] was been checked for transversal path injection attempts, however the filter is wrongly implemented, and can be bypassed. Also other functions that should prevent this behavior were not working properly.

Recent Exploits: