header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Emergenices Personnel Information System (Empris) [phormationdir] <= v.20020923 Remote File Include Vulnerability

A remote file include vulnerability exists in Emergenices Personnel Information System (Empris) version v.20020923 and prior. An attacker can exploit this vulnerability to include arbitrary files from remote locations by sending a specially crafted HTTP request containing directory traversal sequences and a malicious file name. This can lead to arbitrary code execution on the vulnerable system.

Enterprise TimeSheet and Payroll (EPS) <= v.1.1 Remote File Include Vulnerability

A remote file include vulnerability exists in Enterprise TimeSheet and Payroll (EPS) version 1.1 and prior. An attacker can exploit this vulnerability to include arbitrary files from remote locations by sending a specially crafted HTTP request containing directory traversal characters. This can be exploited to execute arbitrary PHP code on the vulnerable system.

cms-bandits 2.5, Remote file disclosure

The vulnerability exists due to insufficient sanitization of user-supplied input in the 'spaw_root' parameter of 'td.php' and 'img.php' scripts. A remote attacker can execute arbitrary PHP code on the vulnerable system by passing it via the 'spaw_root' parameter in a specially crafted HTTP request.

Xtreme/Ditto News <= v.1.0 Remote File Include Vulnerability

A remote file include vulnerability exists in Xtreme/Ditto News versions <= v.1.0. An attacker can exploit this vulnerability to include arbitrary files from remote locations by sending a specially crafted HTTP request containing directory traversal sequences and a malicious file name. This can be exploited to execute arbitrary PHP code on the vulnerable system.

QBik Wingate version 6.1.1.1077 remote exploit for Win2k SP4 (german)

This exploit is a proof of concept for a remote code execution vulnerability in QBik Wingate version 6.1.1.1077. The exploit uses a buffer overflow to overwrite the return address of the stack and execute malicious code. The malicious code is encoded using the PexAlphaNum encoder.

Particle wiki <= 1.0.2 Remote SQL_Injection - Username/Password(hash) Extractor

Particle wiki version 1.0.2 and prior are vulnerable to a remote SQL injection attack. An attacker can exploit this vulnerability to extract usernames and passwords (in hash form) from the database. The exploit involves sending a specially crafted HTTP request to the vulnerable application. The request contains a malicious SQL query that when executed, will return the username and password of all users in the database.

SCart 2.0 Remote Code Execution Exploit

This exploit allows an attacker to execute arbitrary code on a vulnerable SCart 2.0 server. The vulnerability is due to an input validation error in the 'scart.cgi' script, which allows an attacker to inject arbitrary commands into the 'page' parameter. This exploit was discovered and published by K-159 in 2006.

Recent Exploits: