header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Dotclear 2.29 – Remote Code Execution (RCE)

The Dotclear version 2.29 is vulnerable to remote code execution (RCE) due to improper input validation. An attacker can exploit this vulnerability to upload and execute malicious scripts on the server, leading to unauthorized access and control over the system. This vulnerability has been discovered by Ahmet Ümit BAYRAM on 26.04.2024.

DotClear SQL Injection Vulnerability

DotClear is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

Multiple Cross-Site Scripting Vulnerabilities in DotClear

DotClear is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

Cross-Site Scripting in DotClear

DotClear is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

dotclear 2.25.3 – Remote Code Execution (RCE) (Authenticated)

While writing a blog post, an authenticated user can upload a file with PHP code embedded in it, allowing for remote code execution. The vulnerability exists in dotclear version 2.25.3. By uploading a file with the payload '<?php echo system("id"); ?>', an attacker can execute arbitrary PHP code on the server.

DotClear <= 1.2.4 prepend.php/'blog_dc_path' arbitrary remote inclusion

DotClear is vulnerable to arbitrary remote inclusion due to improper validation of user-supplied input in the 'blog_dc_path' parameter of the 'prepend.php' script. An attacker can exploit this vulnerability to execute arbitrary code on the vulnerable system.

Dotclear Multiple Cross-Site Scripting Vulnerabilities

Dotclear is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.

Dotclear Cross-Site Scripting Vulnerabilities

Dotclear is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.

Recent Exploits: