header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

ASP Talk

The vulnerability is a Cross Site Scripting (XSS) and Remote SQL Injection vulnerability. The XSS vulnerability can be exploited by sending a malicious script in the post parameter. The Remote SQL Injection vulnerability can be exploited by sending a malicious payload in the message parameter.

Mini-CMS 1.0.1 (index.php) Multiple Local File Inclusion Vulnerabilities

Mini-CMS 1.0.1 is vulnerable to multiple local file inclusion vulnerabilities due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability to include arbitrary local files, which can lead to remote code execution. This vulnerability is due to the application including files based on user-supplied input without proper sanitization. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal sequences and a URL-encoded NULL byte (%00) to the vulnerable application. This will allow the attacker to include arbitrary local files, which can lead to remote code execution.

Mini Blog 1.0.1 (index.php) Multiple Local File Inclusion Vulnerabilities

Mini Blog 1.0.1 is vulnerable to multiple local file inclusion vulnerabilities due to insufficient sanitization of user-supplied input to the 'page' and 'admin' parameters of the 'index.php' script. An attacker can exploit this vulnerability to include arbitrary local files and execute arbitrary code on the vulnerable system.

ASPManage Banners RFU/DD Multiple Remote Vuln

ASPManage Banners is prone to multiple remote vulnerabilities, including remote file upload and download. An attacker can exploit these issues to upload and download arbitrary files, allowing the attacker to execute arbitrary code on the affected computer. This can facilitate unauthorized access and privilege escalation.

w3blabor v3.0.5 Arbitrary File Upload & LFI

The w3blabor CMS was secured against hack attacks through various queries and configurations. It also works very stably and communicates quickly with the connected database. The administration is particularly easy in contrast to many other content management systems - and that's exactly what makes it special! The bug upload is in admin/inc/media.inc.php near line 71 (no check on admin privileges) and in admin/inc/meinlogo.inc.php near line 45 (no check on admin priviliges).

phpPgAdmin <= 4.2.1 Local File Inclusion Vulnerability

phpPgAdmin is a web-based administration tool for PostgreSQL. It is vulnerable to a local file inclusion vulnerability due to improper input validation. An attacker can exploit this vulnerability by sending a crafted request to the vulnerable application. This can allow the attacker to read sensitive files on the server.

Recent Exploits: