header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

OneOrZero 1.6.* Perl exploit

In 'tinfo.php' script there are function named uploadAttachment() through which we are able to upload files. It does not checks what the file is uploaded. First of all it uploads small shell, then, due to unknown shell name, it bruteforces it. (Uploaded shell name is concatenation of original filename, unix timestamp and substracted microseconds from time.) Then it uploads new shell through small shell. (Script saves to DB what has been uploaded, but if magic_quotes_gpc=off exploit will disable this logging via SQl-inj.)

FreeLyrics Remote Source Code Disclosure Vulnerability

FreeLyrics is vulnerable to a remote source code disclosure vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. This request contains a parameter (p) which specifies the file to be disclosed. An attacker can use this vulnerability to view the source code of any file on the server.

Extract Website (download.php filename) Local File Include

This exploit allows an attacker to include a file on the server through the web application. The vulnerability is present when a web application allows the user to submit input into files or upload files to the server. The malicious user can then insert a file path that will allow the execution of a file on the web server. This can lead to the disclosure of sensitive information, manipulation of data, or even server compromise.

Online Keyword Research (download.php filename) Local File Include

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'filename' parameter to the 'download.php' script. This can be exploited to include arbitrary files from local resources via directory traversal attacks.

ReVou Twitter Clone Admin Password Changing Exploit

ReVou Twitter Clone is a commercial script written in PHP and MySQL. It is vulnerable to an admin password changing exploit. An attacker can reset the admin password and then login as admin. The attacker can then use the path http://site.tld/revou/adminlogin/index.php?id=dbimport to upload a php shell script. The uploaded file can be accessed at http://site.tld/revou/db_backup/shell.php.

Directory Traversal Attack

Directory traversal, also known as path traversal, is an HTTP attack which allows attackers to access restricted directories and execute commands outside of the web server's root directory. This attack is also known as “dot-dot-slash”, “directory traversal”, “directory climbing” and “backtracking”. It is used by attackers to gain access to files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations, or by using absolute file paths, attackers can access arbitrary files and directories stored on file system including application source code or configuration and critical system files. Directory traversal attacks can also be used to access restricted directories and execute commands outside of the web server's root directory.

MyPHPSite Local File Inclusion Vulnerability

MyPHPSite is vulnerable to Local File Inclusion (LFI) vulnerability. An attacker can exploit this vulnerability by sending a crafted HTTP request containing a maliciously crafted URL with a maliciously crafted parameter value. The maliciously crafted parameter value contains a maliciously crafted path to a file on the server. The maliciously crafted path can be used to access sensitive files on the server, such as the /etc/passwd file. The PoC for this vulnerability is http://[target]/[path]/index.php?mod=../../../../../../etc/passwd%00

Recent Exploits: