Michael Kaufmann
40 exploits
Active since Jun 2018
Froxlor has Local File Inclusion via path traversal in API `def_language` parameter that leads to Remote Code Execution
CVSS 9.9
Froxlor has a PHP Code Injection via Unescaped Single Quotes in userdata.inc.php Generation (MysqlServer API)
CVSS 9.1
Froxlor has a BIND Zone File Injection via Unsanitized DNS Record Content in DomainZones::add()
CVSS 8.5
Froxlor has Incomplete Symlink Validation in DataDump.add() that Allows Arbitrary Directory Ownership Takeover via Cron
CVSS 7.5
Froxlor has an Email Sender Alias Domain Ownership Bypass via Wrong Array Index that Allows Cross-Customer Email Spoofing
CVSS 5.0
Froxlor has a Reseller Domain Quota Bypass via Unvalidated adminid Parameter in Domains.add()
CVSS 5.4
Froxlor is vulnerable to BIND zone file injection via unsanitized DNS record content in DomainZones API
CVSS 8.8
Froxlor <2.3.4 - Command Injection
CVSS 9.1
Froxlor <0.9.39.5 - Privilege Escalation
CVSS 7.5
Froxlor <0.10.14 - RCE
CVSS 8.8
Froxlor < 0.10.14 - Improper Input Validation
CVSS 6.1
froxlor/froxlor <0.10.38 - CSRF
CVSS 6.5
Froxlor < 0.10.39 - Code Injection
CVSS 4.6
froxlor/froxlor <0.10.38.2 - Code Injection
CVSS 6.1
froxlor/froxlor <2.0.0-beta1 - Command Injection
CVSS 5.4
froxlor/froxlor <2.0.0-beta1 - CSRF
CVSS 4.3
GitHub froxlor/froxlor <2.0.0-beta1 - Info Disclosure
CVSS 4.3
froxlor/froxlor <2.0.0 - Path Traversal
CVSS 5.5
GitHub froxlor/froxlor <2.0.10 - Info Disclosure
CVSS 5.4
froxlor/froxlor <2.0.10 - Info Disclosure
CVSS 5.5
Froxlor < 2.0.10 - XSS
CVSS 6.2
GitHub froxlor/froxlor <2.0.10 - Info Disclosure
CVSS 5.3
Froxlor < 2.0.10 - Code Injection
CVSS 8.8
Froxlor < 2.0.11 - Code Injection
CVSS 8.8
Froxlor < 2.0.11 - CSRF
CVSS 8.8