header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PunBB (PunPortal 0.1) Local File Inclusion Exploit

PunBB (PunPortal 0.1) is vulnerable to a local file inclusion vulnerability due to the lack of proper input validation. An attacker can exploit this vulnerability by sending a crafted HTTP request with a maliciously crafted pun_user[is_guest] and pun_user[language] parameter to the vulnerable application. This will allow the attacker to read arbitrary files from the server.

Exodus v0.10 remote code execution exploit

This exploit uses the '-l' argument to overwrite a file inside Microsoft Help and Support Center folders. Firstly, the attacker runs netcat in listen mode to drop the vbscript shell. Then, the attacker uses a malicious link to execute the shell. The malicious link contains a command to start the calculator application.

AskPert (Auth bypass) SQL Injection Vulnerability

AskPert is prone to an authentication bypass vulnerability due to a failure to properly sanitize user-supplied input. An attacker can exploit this issue to gain access to the application and perform unauthorized actions. This issue affects AskPert version 1.0.0; other versions may also be vulnerable.

MauryCMS <= 0.53.2 Remote Shell Upload Exploit

This exploit allows an attacker to upload a malicious shell to the vulnerable MauryCMS version 0.53.2. The exploit uses an SQL injection vulnerability to gain access to the admin panel and then uploads the malicious shell. The malicious shell is then accessible via the URL http://host/path/file.php.

MyTopix <= 1.3.0 (notes send) Remote SQL Injection Exploit

MyTopix <= 1.3.0 is vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable application. This can allow the attacker to gain access to sensitive information from the database, such as usernames and passwords.

PunBB (Private Messaging System 1.2.x) Multiple LFI Exploit

PunBB (Private Messaging System 1.2.x) is vulnerable to multiple LFI exploits due to the lack of proper input validation. An attacker can exploit this vulnerability by sending malicious requests to the vulnerable files such as functions_navlinks.php, profile_send.php, viewtopic_PM-link.php, header_new_messages.php, etc. with the parameter pun_user[language] set to a malicious file path. This can be used to read sensitive files such as /etc/passwd.

Alex article-engine V1.3.0 (fckeditor) Arbitrary File Upload

A vulnerability exists in Alex article-engine V1.3.0 (fckeditor) which allows an attacker to upload arbitrary files. This is due to a lack of proper validation of the file type being uploaded. An attacker can exploit this vulnerability by sending a malicious file to the vulnerable script and execute arbitrary code on the server.

Recent Exploits: