header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Traq <= 2.3 Authentication Bypass / Remote Code Execution Exploit

This module exploits an arbitrary command execution vulnerability in Traq 2.0 to 2.3. It's in the admincp/common.php script. This function is called in each script located into /admicp/ directory to make sure the user has admin rights, but this is a broken authorization schema due to the header() function doesn't stop the execution flow. This can be exploited by malicious users to execute admin functionality resulting for e.g. in execution of arbitrary PHP code leveraging of plugins.php functionality.

Xoops 2.5.4 Blind SQL Injection

Xoops 2.5.4 is vulnerable to Blind SQL Injection. An attacker can exploit this vulnerability to gain access to the administration menu. The vulnerability exists in the 'fct' parameter of the 'admin.php' script. By manipulating the 'selgroups' parameter, an attacker can inject malicious SQL code.

FCMS_2.7.2 cms and earlier multiple CSRF Vulnerability

This vulnerability allows a malicious hacker to change password of a user and also it allows changing the website information. First, the attacker must install all optional sections during installation process. There are CSRF in all sections in this application, for example, the attacker can add news, pray for, change the password and can do all functionalities are there. The attacker can save the exploit code in a file called 'code.html' and then call it from another page using an iframe.

BLIND SQL injection UPM-POLLS wordpress plugin 1.0.4

The Variable PID is not properly sanitized in the get request before insertion into the database query; allowing an attaacker or any user who can view poll results (supposedly all user) to use blind sql injection to extract database data and possibly compromise the whole server.

FCMS_2.7.2 cms and earlier multiple stored XSS Vulnerability

When installing FCMS_2.7.2 cms, if all optional sections are installed, an attacker can inject JavaScript code into the 'reply' field on the 'messageboard.php?thread=1' page, the 'text area' field on the 'familynews.php?addnews=yes' page, the 'pray for' field on the 'prayers.php' page, the 'name' field on the 'recipes.php?add=category' page, and the 'Event' field on the 'calendar.php?add=2011-12-2' page. Additionally, reflected XSS can be achieved on the 'calendar.php?add=2011-12-7' and 'gallery/index.php?uid' pages.

Recent Exploits: