header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

JShop 1.x-2.x local file include

JShop Server 1.x-2.x is vulnerable to Local File Inclusion. An attacker can exploit this vulnerability by sending a crafted HTTP request containing directory traversal characters to the vulnerable server. This can allow the attacker to read sensitive files on the server, such as /etc/passwd. An attacker can also upload a malicious file, such as a GIF file containing PHP code, to the vulnerable server. This can allow the attacker to execute arbitrary code on the server. A Perl script can be used to parse the output of the error log and print the results.

KISGB (Keep It Simple Guest Book) : Local FiLe Include’s (tmp_theme)

KISGB (Keep It Simple Guest Book) is vulnerable to Local File Inclusion vulnerability. An attacker can exploit this vulnerability to include a file from the local system which may lead to information disclosure. This vulnerability exists due to insufficient sanitization of user-supplied input to the 'tmp_theme' parameter in 'view_private.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable script. This may lead to information disclosure.

mxBB Module mx_blogs 2.0.0-beta Remote File Include Exploit

This exploit allows an attacker to inject malicious code into a vulnerable web application. The vulnerability exists in the mx_blogs module of mxBB, which is vulnerable to a remote file include attack. The attacker can inject malicious code into the vulnerable web application by sending a specially crafted HTTP request to the vulnerable web application.

Runs calc.exe on Office XP SP3 with updates < 03/11/08

This exploit allows a remote attacker to execute arbitrary code on a vulnerable system. It is triggered by sending a specially crafted packet to the target system. The exploit takes advantage of a vulnerability in Microsoft Office XP SP3 with updates prior to 03/11/08. The vulnerability is caused by a boundary error when processing certain packets, which can be exploited to cause a stack-based buffer overflow.

AuraCMS 2.x (user.php) – Security Code Bypass & Add Administrator Exploit

AuraCMS 2.x is vulnerable to Security Code Bypass & Add Administrator Exploit. This vulnerability exists due to insufficient validation of user input in the 'user.php' file in the '/content' directory. The application fails to properly validate the username, password, email, and code fields, allowing an attacker to bypass the security code and add an administrator account.

Joomla Component MyAlbum SQL Injection Vulnerability

An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable application. An example of such a query is http://[target]/index.php?option=com_myalbum&album=[SQL], where [SQL] is the malicious SQL query. For example, http://www.akparti.org.tr/disiliskiler/index.php?option=com_myalbum&album=-1+union+select+0,concat(username,char(32),password),2,3,4%20from%20jos_users/*.

Recent Exploits: