header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

vcart version 3.3.2

vcart version 3.3.2 is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code within the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.

DomPHP v0.81 Remote Sql Injection

A remote SQL injection vulnerability exists in DomPHP v0.81. An attacker can exploit this vulnerability to inject arbitrary SQL commands in the application by sending a specially crafted HTTP request to the vulnerable application. This can allow an attacker to gain access to sensitive information stored in the back-end database.

Evilsentinel <= 1.0.9 Disable Exploit

Evilsentinel is vulnerable to an admin bypass, captcha bypass, and spamming/anon mailing. The admin bypass is due to the lack of authentication check in the admin/index.php file. The captcha bypass is due to the lack of a call to the captcha.php file and the lack of a post variable named 'es_security_captcha'. The spamming/anon mailing is due to the ability to set a new mail for the admin in the ACP and attack the site with special forged HTTP_USER_AGENT headers to send a mail with the text you want.

DomPHP v0.81 Remote File Inclusion Vulnerability

DomPHP v0.81 is vulnerable to a remote file inclusion vulnerability. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. This request contains a maliciously crafted URL with a malicious file as a parameter. The malicious file is then included and executed on the vulnerable server.

DomPHP <= 0.81 Remote Add Administrator Exploit

This exploit allows an attacker to add an administrator to a DomPHP CMS website. The exploit works by sending a POST request with a specially crafted form data to the admin/index.php page. The form data contains the login, password, email, and level of the new administrator. If successful, the exploit will return a Location header with the URL of the newly added administrator.

Recent Exploits: