header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Dolphin PHP

Dolphin PHP version 6.1.2 is vulnerable to Remote File Inclusion in multiple files. The vulnerable files are HTMLSax3.php, safehtml.php and content.inc.php. An attacker can exploit this vulnerability by sending a malicious URL in the 'dir[plugins]' parameter of HTMLSax3.php, 'dir[plugins]' parameter of safehtml.php and 'sIncPath' parameter of content.inc.php.

Mole Group Hotel Script 1.0 Remote SQL Injection Vulnerability

Mole Group Hotel Script suffers from a insecure mysql query in the 'file' variable. This can lead to malicous users arbitrary selecting confidential information from the database. The SQL injection can be found in the URL http://site.com/index.php?file=1/**/UNION/**/ALL/**/SELECT/**/1,CONVERT(name/**/using/**/latin1),3,4/**/FROM/**/settings/*

Fuzzylime CMS 3.01 Multiple LFI / RCE

Fuzzylime CMS 3.01 is vulnerable to Local File Inclusion (LFI) and Remote Code Execution (RCE). An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable server. The attacker can use the LFI vulnerability to include a malicious file from the server and execute arbitrary code. The attacker can also use the RCE vulnerability to execute arbitrary code on the server.

Blind SQL Injection Vulnerability in Pay Per Click Script

A Blind SQL Injection vulnerability was found in Pay Per Click Script powered by SmartPPC.com. An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable server with the payload 'site.com/directory.php?username=&idDirectory=90992%20and%20ascii(substring((SELECT%20concat(username,0x3a,pass)%20from%20users%20limit%200,1),1,1))%3E108' which can be used to extract sensitive information from the database.

CMailServer 5.4.6 mvmail.asp/CMailCOM.dll remote seh overwrite proof of concept exploit

A remote SEH overwrite vulnerability exists in CMailServer 5.4.6 due to improper bounds checking of user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable server, resulting in arbitrary code execution.

Recent Exploits: