Michael Kaufmann

40 exploits Active since Jun 2018
CVE-2023-1307 WRITEUP CRITICAL WRITEUP
Froxlor < 2.0.13 - Authentication Bypass
Authentication Bypass by Primary Weakness in GitHub repository froxlor/froxlor prior to 2.0.13.
CVSS 9.8
CVE-2023-2034 WRITEUP HIGH WRITEUP
Froxlor < 2.0.14 - Unrestricted File Upload
Unrestricted Upload of File with Dangerous Type in GitHub repository froxlor/froxlor prior to 2.0.14.
CVSS 8.8
CVE-2023-2666 WRITEUP HIGH WRITEUP
GitHub froxlor/froxlor <2.0.16 - Info Disclosure
Allocation of Resources Without Limits or Throttling in GitHub repository froxlor/froxlor prior to 2.0.16.
CVSS 7.5
CVE-2023-3172 WRITEUP HIGH WRITEUP
froxlor/froxlor <2.0.20 - Path Traversal
Path Traversal in GitHub repository froxlor/froxlor prior to 2.0.20.
CVSS 7.2
CVE-2023-3173 WRITEUP CRITICAL WRITEUP
GitHub froxlor/froxlor <2.0.20 - Info Disclosure
Improper Restriction of Excessive Authentication Attempts in GitHub repository froxlor/froxlor prior to 2.0.20.
CVSS 9.8
CVE-2023-3192 WRITEUP MEDIUM WRITEUP
froxlor/froxlor <2.1.0 - Info Disclosure
Session Fixation in GitHub repository froxlor/froxlor prior to 2.1.0.
CVSS 5.4
CVE-2023-3668 WRITEUP HIGH WRITEUP
GitHub froxlor/froxlor <2.0.21 - XSS
Improper Encoding or Escaping of Output in GitHub repository froxlor/froxlor prior to 2.0.21.
CVSS 7.2
CVE-2023-4304 WRITEUP LOW WRITEUP
froxlor <2.0.22,2.1.0 - Info Disclosure
Business Logic Errors in GitHub repository froxlor/froxlor prior to 2.0.22,2.1.0.
CVSS 3.8
CVE-2023-4829 WRITEUP MEDIUM WRITEUP
GitHub froxlor/froxlor <2.0.22 - XSS
Cross-site Scripting (XSS) - Stored in GitHub repository froxlor/froxlor prior to 2.0.22.
CVSS 5.4
CVE-2023-50256 WRITEUP HIGH WRITEUP
Froxlor < 2.1.2 - Improper Input Validation
Froxlor is open source server administration software. Prior to version 2.1.2, it was possible to submit the registration form with the essential fields, such as the username and password, left intentionally blank. This inadvertent omission allowed for a bypass of the mandatory field requirements (e.g. surname, company name) established by the system. Version 2.1.2 fixes this issue.
CVSS 7.5
CVE-2023-5564 WRITEUP MEDIUM WRITEUP
Froxlor < 2.1.0 - XSS
Cross-site Scripting (XSS) - Stored in GitHub repository froxlor/froxlor prior to 2.1.0-dev1.
CVSS 4.8
CVE-2023-6069 WRITEUP CRITICAL WRITEUP
GitHub froxlor/froxlor <2.1.0 - Info Disclosure
Improper Link Resolution Before File Access in GitHub repository froxlor/froxlor prior to 2.1.0.
CVSS 9.9
CVE-2024-34070 WRITEUP CRITICAL WRITEUP
Froxlor <2.1.9 - XSS
Froxlor is open source server administration software. Prior to 2.1.9, a Stored Blind Cross-Site Scripting (XSS) vulnerability was identified in the Failed Login Attempts Logging Feature of the Froxlor Application. An unauthenticated User can inject malicious scripts in the loginname parameter on the Login attempt, which will then be executed when viewed by the Administrator in the System Logs. By exploiting this vulnerability, the attacker can perform various malicious actions such as forcing the Administrator to execute actions without their knowledge or consent. For instance, the attacker can force the Administrator to add a new administrator controlled by the attacker, thereby giving the attacker full control over the application. This vulnerability is fixed in 2.1.9.
CVSS 9.6
CVE-2025-29773 WRITEUP MEDIUM WRITEUP
Froxlor < 2.2.6 - Authentication Bypass
Froxlor is open-source server administration software. A vulnerability in versions prior to 2.2.6 allows users (such as resellers or customers) to create accounts with the same email address as an existing account. This creates potential issues with account identification and security. This vulnerability can be exploited by authenticated users (e.g., reseller, customer) who can create accounts with the same email address that has already been used by another account, such as the admin. The attack vector is email-based, as the system does not prevent multiple accounts from registering the same email address, leading to possible conflicts and security issues. Version 2.2.6 fixes the issue.
CVSS 5.8
CVE-2025-48958 WRITEUP MEDIUM WRITEUP
Froxlor <2.2.6 - XSS
Froxlor is open source server administration software. Prior to version 2.2.6, an HTML Injection vulnerability in the customer account portal allows an attacker to inject malicious HTML payloads in the email section. This can lead to phishing attacks, credential theft, and reputational damage by redirecting users to malicious external websites. The vulnerability has a medium severity, as it can be exploited through user input without authentication. Version 2.2.6 fixes the issue.
CVSS 5.5