header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Tugux CMS (nid) BLIND sql injection vulnerability

The Tugux CMS is vulnerable to blind SQL injection. An attacker can exploit this vulnerability by injecting malicious SQL queries through the 'nid' parameter in the 'latest.php' page. The vulnerability can be confirmed by using the provided proof of concept (p0c) examples. Additionally, the vulnerability can also be used to obtain the MySQL version running on the server by accessing the server on port 3306.

Log1 CMS 2.0 Multiple Vulnerabilities

This CMS suffers from multiple vulnerabilities. 1] "AjaxFileManager" implemented without the need for a valid session. Path: http://localhost/admin/libraries/ajaxfilemanager/ajaxfilemanager.php 2] "ajax_save_name.php" can be used to rename any file on the system/www-root to any name that contains safe extensions (txt,jpg etc) 3] "AjaxFileManager.php" allows download of even php files if its under the 'Root Folder'. Exploit: http://localhost/admin/libraries/ajaxfilemanager/ajax_download.php?path=../../../db/uploaded/index.php 4] "main.php" can be used to upload any file-type as long as this is true : "Content-Type: image:jpeg" Exploit:http://localhost/admin/main.php?action=upload

N`CMS 1.1E Pre-Auth Local File Inclusion Remote Code Exploit

This exploit targets the N`CMS 1.1E software and allows for pre-authentication local file inclusion, which can be used to execute remote code. The vulnerable code is shown in the script. By manipulating the 'page' parameter in the URL, an attacker can include arbitrary files on the server and potentially execute malicious code. The exploit requires a wordlist for bruteforcing the database credentials.

Recent Exploits: