header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

leaftec cms multiple vulnerabilities

The leaftec cms is vulnerable to SQL Injection and XSS/HTML Code Injection. The SQL Injection vulnerability can be exploited by manipulating the 'id' parameter in the 'article.php' file. The XSS/HTML Code Injection vulnerability allows an attacker to inject malicious HTML or JavaScript code, which is then executed on the website. Examples of both vulnerabilities are provided in the text.

DaFun Spirit 2.2.5 Multiple Remote File Include Vulnerability

This vulnerability allows an attacker to include remote files on the target server. The vulnerability exists in the DaFun Spirit 2.2.5 script. By manipulating the 'lgsl_path' parameter in the lgsl_protocol.php, an attacker can include arbitrary files from a remote server. This can lead to remote code execution or information disclosure on the target server.

SAP MaxDB Malformed Handshake Request Remote Code Execution

This exploit allows an attacker to execute arbitrary code on a vulnerable SAP MaxDB server by sending a specially crafted handshake request. The vulnerability is caused by a buffer overflow in the server's handling of handshake requests, allowing an attacker to overwrite the return address and execute arbitrary code.

Direct News 4.10.2 Multiple Remote File Include Vulnerability

The Direct News 4.10.2 script is vulnerable to multiple remote file inclusion vulnerabilities. The affected files include 'menu.php', 'update_content.php', 'class.backup.php', and 'lib.menu.php'. These vulnerabilities allow an attacker to include arbitrary remote files by manipulating the 'rootpath' or 'adminroot' parameters. This can lead to remote code execution and compromise the security of the application.

Joomla component com_universal <= Remote File Inclusion Vulnerability exploit

The Joomla component com_universal (UWCMS Universal Web CMS) version 1.0.0 is vulnerable to remote file inclusion. The vulnerability is present in the 'config.html.php' file, where the 'mosConfig_absolute_path' parameter is not properly validated before being used in a require_once() function. An attacker can exploit this vulnerability by injecting a malicious URL in the 'mosConfig_absolute_path' parameter, allowing them to include and execute arbitrary files on the server.

Joomla component com_jwmmxtd <= Remote File Inclusion Vulnerability

The Joomla component com_jwmmxtd has a vulnerability that allows remote file inclusion. The vulnerability is present in the admin.jwmmxtd.php file, where the mosConfig_absolute_path parameter is not properly sanitized, allowing an attacker to include arbitrary files from the server.

Recent Exploits: