header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

YAP v1.1.1 Local File Inclusion Vulnerability

YAP v1.1.1 is vulnerable to a Local File Inclusion vulnerability. An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable server, containing a maliciously crafted URL parameter. This can allow an attacker to read arbitrary files from the server, such as configuration files, source code, etc. The vulnerable URL parameter is 'page', and the malicious URL would look like http://www.site.com/index.php?page=[LFI]%00

WordPress MU < 2.7 'Host' HTTP Header Cross Site Scripting (XSS) Vulnerability

WordPress MU prior to version 2.7 fails to sanitize the Host header correctly in choose_primary_blog function and is therefore prune to XSS attacks. Web Sites running in a name based virtual hosting setup are not affected while they are not the default virtual host.

WeBid <= 0.7.3 RC9 Multiple Remote File Inclution Vulnerabilities

Input passed to the "$include_path" parameter in cron.php page is not properly verified before being used to include files.This can be exploited to include arbitrary files from local or external resources.This vulnerability also happen to files ST_browsers.php, ST_countries.php, ST_platforms.php in admin's folder Successful exploitation requires that "register_globals" is enabled.

PHP-Fusion Mod – Book Panel Remote SQL Injection Vulnerability

A vulnerability exists in the PHP-Fusion Mod - Book Panel, which can be exploited by malicious people to conduct SQL injection attacks. Input passed to the 'course_id' parameter in 'index.php' is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation may allow execution of arbitrary SQL commands.

Recent Exploits: