header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

xorg-x11-server < 1.20.3 - Local Privilege Escalation (Solaris11 inittab)

A flaw was found in xorg-x11-server before 1.20.3. An incorrect permission check for -modulepath and -logfile options when starting Xorg. X server allows unprivileged users with the ability to log in to the system via physical console to escalate their privileges and run arbitrary code under root privileges.

Live Call Support 1.5 – Remote Code Execution / SQL Injection

A vulnerability in Live Call Support 1.5 allows an attacker to execute arbitrary code or perform an SQL injection attack. This is due to the application not properly validating user-supplied input when handling file uploads. An attacker can exploit this vulnerability by sending a specially crafted HTTP POST request containing malicious code in the call_widget_image parameter. This will allow the attacker to execute arbitrary code on the vulnerable system.

Live Call Support 1.5 – Cross-Site Request Forgery (Add Admin)

Live Call Support 1.5 is vulnerable to Cross-Site Request Forgery (CSRF) which allows an attacker to add an admin user to the application. This is due to the application not verifying whether a malicious request is being sent from a valid source. An attacker can craft a malicious request and send it to the vulnerable application, which will then add an admin user to the application.

Modern POS 1.3 – Arbitrary File Download

Modern POS 1.3 is vulnerable to arbitrary file download. An attacker can exploit this vulnerability by sending a crafted HTTP request to the target server. The request should contain the action parameter set to download and the path parameter set to the file that the attacker wants to download. This vulnerability can be exploited to download sensitive files such as configuration files, which can lead to further attacks.

Horde Imp Unauthenticated Remote Command Execution

Horde Imp, an application that comes with the Horde GroupWare/Webmail suite exposes an unauthenticated debug page with a form that permits IMAP requests to arbitrary hosts. Leveraging the CVE 2018-19518 and no input sanitization is possible to execute shell commands.

i-doit CMDB 1.12 – Arbitrary File Download

A vulnerability in i-doit CMDB 1.12 allows an attacker to download arbitrary files from the server by sending a specially crafted HTTP request. The vulnerability exists due to insufficient validation of user-supplied input in the 'file_manager' parameter of the 'index.php' script. An attacker can exploit this vulnerability to download arbitrary files from the server.

Recent Exploits: