header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Merlix Educate Servert Bypass/DD Multiple Remote Vuln

Merlix Educate Server is prone to multiple remote vulnerabilities, including a bypass and a directory traversal vulnerability. An attacker can exploit these issues to bypass security restrictions and gain access to sensitive files, potentially leading to further attacks.

Multiple Membership Script V 2.5 SQL Injection Vulnerability

A vulnerability exists in Multiple Membership Script V 2.5 which allows an attacker to inject malicious SQL commands and gain access to sensitive information from the database. An attacker can exploit this issue by supplying a specially crafted parameter value to the vulnerable application. This can be exploited to gain access to the database and execute arbitrary SQL commands.

BNCwi <= 1.04 Local File Inclusion Vulnerability

BNCwi is a Open-Source webinterface for psyBNC. With it you easily can manage your Bouncer via a graphical interface. A vulnerability exists in the index.php file of the BNCwi script, which allows an attacker to include arbitrary local files on the server. This is due to a lack of input validation on the 'newlanguage' parameter, which is passed to the 'include()' function. An attacker can exploit this vulnerability by sending a specially crafted HTTP POST request with a malicious 'newlanguage' parameter.

gravity-gtd <= 0.4.5 LFI/RCE Vulnerability

An open source list manager for tracking action items according to the principles of Getting Things Done (GTD) is vulnerable to LFI/RCE. The vulnerability exists in the file rpc.php (lines: 15-20) where the user input is not properly sanitized. This allows an attacker to inject malicious code and execute it on the server.

Joomla Component mydyngallery exploit

A SQL injection vulnerability exists in the Joomla Component mydyngallery, which allows an attacker to execute arbitrary SQL commands via the 'directory' parameter in a index.php?option=com_mydyngallery request. The attacker can use the 'union' keyword to append the results of a second query to the results of the first query, and can use the 'concat' keyword to concatenate strings together.

My Simple Forum 3.0 (index.php action) Local File Inclusion Vulnerability

My Simple Forum 3.0 is vulnerable to a local file inclusion vulnerability due to a lack of sanitization of the 'action' parameter in the index.php file. An attacker can exploit this vulnerability by sending a crafted HTTP request with a malicious 'action' parameter containing directory traversal sequences (e.g. '../../../../../../../etc/passwd%00') to the vulnerable server. This will allow the attacker to read arbitrary files from the server.

lcxBBportal 0.1 Alpha 2 Remote File Inclusion Vulnerability

lcxBBportal version 0.1 Alpha 2 is vulnerable to Remote File Inclusion. The vulnerable files are portal/includes/portal_block.php and includes/acp/acp_lcxbbportal.php. An attacker can exploit this vulnerability by sending a malicious URL to the application. The malicious URL contains the path to the malicious file which will be included in the vulnerable file.

ASP Template Creature DD/SQL Multiple Remote Vuln.

A vulnerability in ASP Template Creature allows an attacker to perform a directory traversal attack and a SQL injection attack. The attacker can access the templatemonster.mdb file and can also access the tb_adminUser table to gain access to the username and password of the administrator.

Wbstreet v.1.0 (show.php id) Remote SQL Injection Vulnerability

A vulnerability exists in Wbstreet v.1.0, which allows a remote attacker to inject arbitrary SQL commands via the 'id' parameter in the 'show.php' script. An attacker can exploit this vulnerability to gain access to the database, disclose sensitive information, modify data, and execute system level commands.

Recent Exploits: