header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Vikingboard <= 0.2 Beta SQL Column Truncation

A vulnerability in Vikingboard <= 0.2 Beta allows an attacker to register an user/admin that already exists. This is done by sending a specially crafted request to the upload/register.php page with a NULL value for the username field. An attacker can then use the same credentials to log in to the upload/login.php page.

PHP infoBoard V.7 Plus Multiple Remote Vulnerabilities

PHP infoBoard V.7 Plus is vulnerable to Remote SQL Injection and Stored XSS. An attacker can inject malicious SQL code into the 'idcat' parameter of the 'showtopic.php' page to gain access to the database. Additionally, an attacker can inject malicious JavaScript code into the 'isname' parameter of the 'newtopic' page to perform a stored XSS attack.

K-Lite Mega Codec Pack based Local Windows Explorer DOS PoC

K-Lite Mega Codec Pack based Local Windows Explorer DOS PoC is a proof-of-concept exploit that crashes Windows Explorer when a user tries to use, select, or highlight the attached Test7.flv file in Windows Explorer. This causes Windows Explorer to crash.

Vikingboard <= 0.2 Beta Local File Inclusion Vulnerability

Vikingboard is a PHP-based discussion forum. A vulnerability exists in Vikingboard 0.2 Beta which allows attackers to include arbitrary local files via the 'task' parameter in the 'index.php' script. This can be exploited to disclose sensitive information or to execute arbitrary PHP code.

phpOCS <= 0.1-beta3 Local File Inclusion Vulnerability

A local file inclusion vulnerability exists in phpOCS <= 0.1-beta3. The vulnerability is due to the application including user-supplied input without proper validation. This can be exploited to include arbitrary local files by e.g. passing 'act=../../../../../../../etc/passwd%00' in the 'act' parameter to index.php. Successful exploitation requires that 'register_globals' is enabled.

Lansuite <= 3.4 beta r1363 Local File Inclusion Vulnerability

Lansuite is vulnerable to a local file inclusion vulnerability due to a lack of proper sanitization of user-supplied input. This vulnerability allows an attacker to include a file from the local system and execute arbitrary code. The vulnerability is due to the 'design' parameter in the 'index.php' script not being properly sanitized before being used. This can be exploited to include arbitrary files from local resources via directory traversal sequences and URL-encoded NULL bytes.

Xss /Remote SQL injection

Aj auction platinum2, the last version, is vulnerable to XSS and SQL Injection. An attacker can exploit this vulnerability by sending a malicious payload to the search.php?min_cur=&product parameter. Additionally, an attacker can exploit the SQL Injection vulnerability by sending a malicious payload to the sellers_othersitem.php?seller_id= parameter.

MS Windows Wordpad .doc File Local Denial of Service PoC

A denial of service vulnerability exists in Microsoft Windows Wordpad when opening a specially crafted .doc file. The vulnerability is caused due to an error in the handling of .doc files and can be exploited to crash the application.

Recent Exploits: