header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Blogator-script 0.95 Change User Password Vulnerability

A vulnerability exists in Blogator-script 0.95 which allows an attacker to change the password of any user by exploiting the init_pass2.php file. The attacker can send a malicious request to the vulnerable file with the user ID and a new password, and the user's password will be changed.

Dragoon CMS

Dragoon CMS is vulnerable to Local File Inclusion (LFI) vulnerability. The vulnerable code is present in the calendrier.php file which is located in the forum/kietu/libs/ directory. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. The malicious request contains a parameter 'cal[lng]' with a value of [LFI] which can be used to include arbitrary files from the server.

Blogator-script 0.95 SQL Injection Vulnerability

A SQL injection vulnerability exists in Blogator-script 0.95 due to improper sanitization of user-supplied input to the 'id_art' parameter in '/_blogadata/include/sond_result.php'. An attacker can exploit this vulnerability to gain access to sensitive information from the database, such as usernames, passwords, and emails.

ypupdated_exec.rb

This exploit targets a weakness in the way the ypupdated RPC application uses the command shell when handling a MAP UPDATE request. Extra commands may be launched through this command shell, which runs as root on the remote host, by passing commands in the format '|<command>'.

Blogator-script Remote File Inclusion Vulnerability

Blogator-script is prone to a remote file-inclusion vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code within the context of the vulnerable application. Successful exploits can allow attackers to compromise the application and the underlying system; other attacks are also possible.

Recent Exploits: