header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Wpeasystats WordPress plugin RFI

The Wpeasystats Wordpress plugin is vulnerable to a Remote File Inclusion (RFI) attack. An attacker can send a malicious URL to an unsuspecting user, which when clicked, will execute arbitrary code on the vulnerable server. This is possible due to the lack of input validation in the export.php file, which allows an attacker to include a remote file via the 'homep' parameter.

Allwebmenus WordPress Menu Plugin WordPress plugin RFI

Allwebmenus Wordpress Menu Plugin is vulnerable to Remote File Inclusion (RFI) vulnerability. An attacker can exploit this vulnerability by sending a crafted HTTP request with a malicious file path in the 'abspath' parameter. This will allow the attacker to execute arbitrary code on the vulnerable system.

Thecartpress WordPress plugin RFI

Thecartpress Wordpress plugin is vulnerable to Remote File Inclusion (RFI) due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. This can allow the attacker to execute arbitrary code on the server, resulting in a complete compromise of the system.

Toko Lite CMS 1.5.2 (edit.php) HTTP Response Splitting Vulnerability

Input passed to the 'charSet' parameter in 'edit.php' is not properly sanitised before being returned to the user. This can be exploited to insert arbitrary HTTP headers, which are included in a response sent to the user.

WordPress Filedownload Plugin 0.1 (download.php) Remote File Disclosure Vulnerability

The WordPress Filedownload Plugin 0.1 is vulnerable to a remote file disclosure vulnerability. An attacker can exploit this vulnerability by sending a crafted request to the download.php file with the path parameter set to the path of the file they wish to disclose. This vulnerability can be exploited by using the Google Dork 'inurl:/wp-content/plugins/filedownload/download.php/?path'

WordPress Count per Day plugin <= 2.17 SQL Injection Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input in the 'month' parameter of the 'notes.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in the context of the application. This can allow the attacker to bypass authentication and gain access to the application data.

KnFTP Server Buffer Overflow Exploit (DoS PoC)

The KnFTP Server is vulnerable to a buffer overflow attack, which can be exploited to cause a denial of service. The vulnerable commands are MKD, LS, ABOR, CD, APPE, REST, and PWD. The application was tested on Windows XP SP2/SP3 Professional with DEP off. The EAX, ECX, EDX, EBX, ESP, EBP, ESI, EDI, EIP, C, P, A, Z, S, T, D, O, EFL, ST0-ST7, FST, and FCW registers are all overwritten.

DaqFactory HMI NETB Request Overflow

This module exploits a stack buffer overflow in Azeotech's DaqFactory product. The specfic vulnerability is triggered when sending a specially crafted 'NETB' request to port 20034. Exploitation of this vulnerability may take a few seconds due to the use of egghunter. This vulnerability was one of the 14 releases discovered by researcher Luigi Auriemma.

iManager Plugin v1.2.8 (d) Remote Arbitrary File Deletion Vulnerability

Input passed to the 'd' parameter in /scripts/phpCrop/crop.php is not properly sanitised before being used to delete files. This can be exploited to delete files with the permissions of the web server via directory traversal sequences passed within the 'd' parameter.

iManager Plugin v1.2.8 (lang) Local File Inclusion Vulnerability

iManager suffers from a file inlcusion vulnerability (LFI) / file disclosure vulnerability (FD) when input passed thru the 'lang' parameter to imanager.php, rfiles.php, symbols.php, colorpicker.php, loadmsg.php, ov_rfiles.php and examples.php is not properly verified before being used to include files. This can be exploited to include files from local resources with directory traversal attacks and URL encoded NULL bytes.

Recent Exploits: