header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Kloxo-MR 6.5.0 CSRF Vulnerability

Kloxo-MR has lots of POST and GET based form applications like Kloxo stable, some inputs escaped from specialchars but inputs dont have any csrf protection or secret key. So an remote attacker can manipulate this forms to add/delete mysql user,create/delete subdomains or add/delete ftp accounts.

Kloxo 6.1.18 Stable CSRF Vulnerability

Kloxo has lots of POST and GET based form applications some inputs escaped from specialchars but inputs dont have any csrf protection or secret key. So an remote attacker can manipulate this forms to add/delete mysql user,create/delete subdomains or add/delete ftp accounts.

iShare Your Moving Library 1.0 iOS – Multiple Vulnerabilities

Multiple persistent input validation vulnerabilities are detected in the official iShare Your moving library iOS mobile web-application. The vulnerability allows remote attackers to implement/inject malicious script code on the application-side (persistent). The vulnerability is located in the 'Name' and 'Description' value of the 'Create New Folder' module. Remote attackers are able to inject own malicious script codes to the application-side of the vulnerable module. The request method to inject is POST and the attack vector is located on the application-side.

Sql Injection on CIS Manager CMS

A SQL injection vulnerability exists in the default.asp file of CIS Manager CMS, which is a content management system developed by Construtiva. An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable parameter 'TroncoID' in the default.asp file. This can allow the attacker to gain access to the database and execute arbitrary code.

SIP Digest Leak Information Disclosure in PhonerLite 2.14 SIP Soft Phone

PhonerLite SIP soft phone version 2.14 is vulnerable to revealing SIP MD5 digest authenticated user credential hash via spoofed SIP INVITE message sent by a malicious 3rd party. After responding back to an authentication challenge to the BYE message, PhonerLite leaks the hashed MD5 digest credentials. After the 3rd party receives the dumped MD5 hash, they can use this information to mount an offline wordlist attack.

End-user exploitable local file inclusion vulnerability in Ajax Pagination (twitter Style) 1.1

A non-logged in user can call the ajax function wp_ajax_nopriv_ajax_navigation that calls ajax_navigation_callback in ajax-pagination-front.php at line 75. By setting the value of “loop” in the POST data, they can include the contents of that path on the returned page.

SePortal SQLi Remote Code Execution

This module exploits a vulnerability found in SePortal version 2.5. When logging in as any non-admin user, it's possible to retrieve the admin session from the database through SQL injection. The SQL injection vulnerability exists in the "staticpages.php" page. This hash can be used to take over the admin user session. After logging in, the "/admin/downloads.php" page will be used to upload arbitrary code.

Vanctech File Commander 1.1 iOS – Multiple Vulnerabilities

A local file include web vulnerability has been discovered in the official Vanctech File Commander v1.1 iOS mobile web-application. A file include web vulnerability allows remote attackers to unauthorized include local files from the mobile web-application. The vulnerability is located in the `file` value of the `/index.php` file. Remote attackers are able to inject own malicious files to the vulnerable application.

Recent Exploits: