header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

phpMyNewsletter <= 0.8 (beta5) Multiple Vuln Exploit

This exploit allows an attacker to perform two different attacks on a vulnerable version of phpMyNewsletter. Attack N°1 allows an attacker to inject a shell into the config file if mq=off. Attack N°2 allows an attacker to send previously created newsletters and spam.

php-generics 1.0 Remote File Inclusion Vulnerabilities

The vulnerability allows an attacker to include a remote file in the application, which can lead to remote code execution. The vulnerability exists in the include.php, /dbcommon/include.php, and /exception/include.php files.

SQL Injection Vulnerability in Dolibarr

Dolibarr is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Solarwinds Firewall Security Manager 6.6.5 Client Session Handling Vulnerability

This module exploits multiple vulnerabilities found in Solarwinds Firewall Security Manager 6.6.5. The first vulnerability is an authentication bypass via the Change Advisor interface due to a user-controlled session.putValue API in userlogin.jsp, allowing the attacker to set the 'username' attribute before authentication. The second problem is that the settings-new.jsp file will only check the 'username' attribute before authorizing the 'uploadFile' action, which can be exploited and allows the attacker to upload a fake xls host list file to the server, and results in arbitrary code execution under the context of SYSTEM. Depending on the installation, by default the Change Advisor web server is listening on port 48080 for an express install. Otherwise, this service may appear on port 8080. Solarwinds has released a fix for this vulnerability as FSM-v6.6.5-HotFix1.zip. You may download it from the module's References section.

Recent Exploits: