header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

DSECRG-08-005

phpCMS system has remote File Disclosure vulnerability in page /parser/include/class.cache_phpcms.php. Attacker can read any files in web directory by appending a valid extension with null byte to file like a “%00.gif” or smth. Also attacker can read admin password from file /parser/include/config.php.

Chilkat Mail ActiveX 7.8 (ChilkatCert.dll) Insecure Method Exploit

A vulnerability exists in Chilkat Mail ActiveX 7.8 (ChilkatCert.dll) which allows an attacker to write arbitrary files to the system. This is due to the insecure use of the SaveLastError method which allows an attacker to specify a file path and write arbitrary data to it.

Safenet IPSecDrv.sys <= 10.4.0.12 local kernel ring0 indirect call SYSTEM exploit

This exploit is a local kernel ring0 indirect call SYSTEM exploit which is used to exploit the vulnerability in Safenet IPSecDrv.sys <= 10.4.0.12. It uses user definable offset used in an indirect call. It is tested on IPSecDrv.sys 10.4.0.12 bundle with SafeNET HighAssurance Remote, SoftRemote and Microsoft Windows 2003 SP2. It is compiled using MinGW and -lntdll.

Smart Publisher 1.0.1 (disp.php) Remote Code Execution Exploit

Smart Publisher 1.0.1 is vulnerable to Remote Code Execution due to an insecure usage of the 'eval()' function in '/admin/op/disp.php' in line 3. An attacker can exploit this vulnerability by sending a maliciously crafted 'filedata' parameter in the URL. For example, sending 'cGhwaW5mbygp' as the 'filedata' parameter will execute the 'phpinfo()' function.

bubbling library v1.32 Remote File Disclosure Vulnerabilities

A vulnerability in bubbling library v1.32 allows remote attackers to disclose arbitrary files from the server. This is due to the lack of proper input validation in the 'uri' parameter of the 'dispatcher.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal sequences (e.g. '../') to the vulnerable script. This will allow the attacker to read arbitrary files from the server.

phpMyClub Local File Inclusion Vulnerability

A Local File Inclusion vulnerability exists in phpMyClub, which allows an attacker to include a file from the local system. The vulnerability is due to insufficient sanitization of user-supplied input to the 'page_courante' parameter in the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal characters ('../') to the vulnerable script. This can allow the attacker to include arbitrary files from the local system, resulting in the disclosure of sensitive information.

MailBee Objects v5.5 (MailBee.dll) Insecure Method

A vulnerability exists in MailBee Objects v5.5 (MailBee.dll) which allows an attacker to save files to the system and create files on the system. This is due to the application not properly validating user-supplied input before using it to execute system commands. An attacker can exploit this vulnerability to save files to the system and create files on the system.

Oracle 10g R1 xDb.XDB_PITRIG_PKG.PITRIG_DROP SQL Injection Exploit

This exploit allows an attacker to change the system password of Oracle 10g R1 by exploiting a SQL Injection vulnerability in the XDB.XDB_PITRIG_PKG.PITRIG_DROP package. The exploit was written by Alexandr 'Sh2kerr' Polyakov and was tested on Oracle 10.1.0.2.0.

Recent Exploits: