header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

LinPHA <= 1.3.3 (maps plugin) Remote Command Execution Exploit

LinPHA <= 1.3.3 is vulnerable to a remote command execution vulnerability due to an LFI found by rgod in /plugins/maps/map.main.class.php. An attacker can modify the 'maps_type' config value by another script and include an arbitrary local file through the require_once() at line 24. The attacker can then include a ChangeLog file containing malicious code to execute arbitrary commands.

Drake CMS <= 0.4.11 Remote Blind SQL Injection Exploit

Drake CMS version 0.4.11 is vulnerable to a blind SQL injection vulnerability due to insufficient sanitization of user-supplied input in the 'gb_name' and 'gb_email' parameters of the 'guestbook.php' script. An attacker can inject arbitrary SQL code through the 'HTTP_VIA' header, resulting in a blind SQL injection at line 29 of the 'guestbook.php' script.

Prozilla Topsites 1.0 Arbitrary Edit/Add Users Vulnerability

Prozilla TopSites is vulnerable due to bad session handling, multiple admin area files are not validating the users that is viewing it, therefor making it viewiable to anyone, even unregistered people. An attacker can exploit this vulnerability to gain access to the admin area and edit/add users.

Prozilla Reviews Script 1.0 Arbitrary Delete User Vulnerability

Prozilla Reviews script suffers from bad session handling, and some crutial parts of the admin area are not checked to see if the user is a admin or not. The below url will delete a user from the database: http://site.com/siteadmin/DeleteUser.php?UserID=[uid], where [uid] should be replaced with a actual user id. A script can also be coded to delete all users.

Fedora Core 6,7,8 (exec-shield) based Apache Tomcat Connector jk2-2.0.2(mod_jk2) remote overflow exploit

This exploit targets Apache Tomcat Connector jk2-2.0.2(mod_jk2) on Fedora Core 6,7,8 (exec-shield) based systems. It allows an attacker to gain remote access to the target system by sending a specially crafted request to the vulnerable server. The exploit is available in the form of a tarball containing a C source code file.

powered by Site Sift scripts SQL Injection

The vulnerability exists due to insufficient filtration of user-supplied data passed to the 'id' parameter in 'index.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database. This can be exploited to bypass authentication and gain access to the administrative panel.

Recent Exploits: