header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Observer <= 0.3.2.1 Remote Command Execution

Observer is an autodiscovering PHP/MySQL/SNMP/CDP based network management system focused primarily on Cisco and Linux/BSD networks. A vulnerability exists in the Observer <= 0.3.2.1 version due to improper input validation in the whois.php and netcmd.php scripts. This allows an attacker to execute arbitrary commands on the vulnerable system.

Barcode Generator 1D Local File Inclusion Vulnerability

A vulnerability exists in Barcode Generator 1D, which can be exploited by malicious people to disclose sensitive information. The vulnerability is caused due to the 'code' parameter in 'image.php' not properly sanitized before being used to include files. This can be exploited to include arbitrary files from local resources via directory traversal attacks.

adnforum <= 1.0b / Insecure Cookie Handling Vulnerability

Cookie is base64 based and the ascii format used is: user:23ed4e45887ad4311ff654bd4aab6540:user:0 user:md5 pass:user:0 Programmer forgot to check the pass and only use the nick to autenticate the user. You can create a fake cookie likes this: sysop:000000000000000000000000000000:sysop:0 In base64: c3lzb3A6MDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwOnN5c29wOjA Exploit: javascript:document.cookie = "fpusuario=c3lzb3A6MDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwOnN5c29wOjA"

webcp 0.5.7 (sendfile.php filelocation) Remote File Disclosure Vulnerability

webcp 0.5.7 is vulnerable to a remote file disclosure vulnerability due to insufficient validation of user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This will allow the attacker to view the contents of arbitrary files on the server.

Jadu CMS for Government (recruit_details.php) Remote SQL Inj

A remote SQL injection vulnerability exists in Jadu CMS for Government. An attacker can exploit this vulnerability to gain access to sensitive information such as usernames and passwords. The vulnerability is due to insufficient sanitization of user-supplied input in the 'id' parameter of the 'recruit_details.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. Successful exploitation of this vulnerability can result in unauthorized access to sensitive information.

PHPcounter <= 1.3.2 Local File Inclusion Vulnerability

A vulnerability exists in PHPcounter version 1.3.2 which allows an attacker to include arbitrary files from the local system. This is due to a lack of sanitization of user-supplied input to the 'l' parameter in the 'defs.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal sequences and a URL-encoded NULL byte.

emergecolab 1.0 Local File Inclusion Vulnerability

A Local File Inclusion vulnerability exists in emergecolab 1.0 due to improper validation of user-supplied input. An attacker can exploit this vulnerability to include arbitrary files from the web server, which may lead to the disclosure of sensitive information or the execution of arbitrary code.

AJ Auction Pro Platinum Skin #2 (detail.php item_id) Remote SQL Injection Vulnerability

AJ Auction Pro Platinum Skin #2 is prone to a remote SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data. This issue affects versions prior to AJ Auction Pro Platinum Skin #2 2.0.2.

Recent Exploits: