header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Openfire 3.10.2 Cross site request forgery (CSRF)

No CSRF tokens exists allowing us to take malicious actions against the application. 1- change admin password. 2- add aribitrary users to the system 3- edit server settings e.g. turn off SSL. 4- Add rogue malicious clients with permit access (Allow all XMPP clients to connect) and more...

Openfire 3.10.2 Remote File Inclusion

In 'available-plugins.jsp' there is no validation for plugin downloads, allowing arbitrary file downloads from anywhere on the internet. On line 40: all that needs to be satisfied is the paramater is not null. If the above condition check returns true, the application downloads whatever file you give it.

Openfire Unrestricted File Upload

Application specifies Plugin files (.jar) can be uploaded directly by using the form, however so can the following: .exe, .php, .jsp, .py, .sh. Exploit code: choose some malicious file using the File browser and click 'upload plugin' at http://localhost:9090/plugin-admin.jsp. Our malicious uploaded files will be stored under /openfire/plugins directory.

TP-Link NC200/NC220 Cloud Camera 300Mbps Wi-Fi Hard-Coded Credentials

NC220 and NC200 utilizes hard-coded credentials within its Linux distribution image. These sets of credentials (root:root) are never exposed to the end-user and cannot be changed through any normal operation of the camera.

ManageEngine OpManager multiple vulnerabilities

ManageEngine OpManager ships with a default account 'IntegrationUser' with the password 'plugin'. This account is hidden from the user interface and will never show up in the user management. Also changing the password for this account is not possible by default. The account however is assigned Administrator privileges and logging in with this account is possible via the web interface. Any account that has access to the web interace can also access the PostgreSQL database. This means that any user with access to the web interface can access the database and gain access to the data stored in the database.

ManageEngine EventLog Analyzer SQL query execution

Every user has the ability to execute SQL queries through the "/event/runQuery.do" script, including the default "guest" user. (The SQL query option is just not visible in the web interface) Below is the POST request, executed as "guest": POST /event/runQuery.do HTTP/1.1 Host: 192.168.2.116:8400 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Cookie: JSESSIONID=XXXXXXXXXX Connection: keep-alive Content-Type: application/x-www-form-urlencoded Content-Length: XXX query=SELECT+*+FROM+EVENTLOG This vulnerability allows an attacker to execute arbitrary SQL queries against the database, allowing for example to dump the user database.

Stack Buffer Overflow in IKEView.exe Fox beta 1

IKEView.exe is vulnerable to local stack based buffer overflow when parsing an malicious (internet key exchange) ".elg" file. Vulnerability causes nSEH & SEH pointer overwrites at 4448 bytes after IKEView parses our malicious file, which may result then result in arbitrary attacker supplied code execution.

Recent Exploits: