header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

vBulletin PhotoPost vBGallery v2.x Remote File Upload

The exploiter can upload a PHP shell via the upload.php script by renaming it to $name.php.wmv. The uploaded file will be in the user's account number folder. For example, if the user's account number is 4, the file path will be http://localhost/Forum/$gallery_path/files/4/$name.php.wmv. If the user's account number is 12345, the file path will be http://localhost/Forum/$gallery_path/files/1/2/3/4/5/$name.php.wmv.

Galatolo Web Manager 1.3a Insecure Cookie Handling Vulnerability

Galatolo Web Manager suffers from insecure cookie handling, when a admin login is successful the script creates a cookie to show the rest of the admin area the user is already logged in. The bad thing is the cookie doesn't contain any password or anything alike, therefor we can craft a admin cookie and make it look like we are logged in as a legit admin. The exploit code is a JavaScript code that sets the cookie values to 'admin' for both 'gwm_user' and 'gwm_pass' and then visits the '/admin' page to gain admin access.

pragyan 2.6.2 Remote File Inclusion

A remote file inclusion vulnerability exists in Pragyan 2.6.2. An attacker can exploit this vulnerability to execute arbitrary code on the vulnerable system. The vulnerability is due to the application failing to properly sanitize user-supplied input to the 'sourceFolder' parameter in the 'form.lib.php' script. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request containing a URL in the 'sourceFolder' parameter. This can allow the attacker to execute arbitrary code on the vulnerable system.

pSys v0.7.0 Alpha Multiple Remote File Include

pSys is a module based PHP Script which is vulnerable to multiple Remote File Include vulnerabilities. The vulnerability exists in different files and in different variables and lines. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server.

Galatolo Web Manager 1.3a <= XSS / Remote SQL Injection Vulnerability

Galatolo Web Manager (GWM) version 1.3a is vulnerable to XSS and Remote SQL Injection. An attacker can inject malicious code into the 'tag' parameter of the 'all.php' script and execute arbitrary JavaScript code in the browser of the victim. An attacker can also inject malicious SQL code into the 'id' parameter of the 'index.php' script of the 'users' plugin to gain access to the database of the application.

Pluck Local File inclusion

Input passed to multiple parameters in "predefined_variables.php" are not properly verified before being used to include files. This can be exploited to include arbitrary files from local resources. POC: http://localhost/pluck-4_5_1/data/inc/themes/predefined_variables.php?blogpost=../../../../../../../../boot.ini

Recent Exploits: