header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

OpenX Remote File Inclusion Vulnerability

OpenX is vulnerable to a remote file inclusion vulnerability due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability by appending a null byte to the end of a string and using directory traversal in the GET parameter MAX_type, like so: /www/delivery/fc.php?MAX_type=../../../../../../../../../../../../../../../etc/passwd%00, which will allow the attacker to view the /etc/passwd file.

Joomla Component Flash Magazine Deluxe Remote Sql Injection

A vulnerability in Joomla Component Flash Magazine Deluxe allows an attacker to inject malicious SQL commands into the application. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'mag_id' parameter of the 'index.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in the context of the application. This can allow the attacker to compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, and compromise the underlying system.

SiteXS <= 0.1.1 Local File Inclusion Exploit

This exploit allows an attacker to gain access to sensitive files on the server by exploiting a vulnerability in SiteXS <= 0.1.1. The vulnerability is caused due to the improper sanitization of user-supplied input to the 'type' parameter in 'post.php'. This can be exploited to include arbitrary files from local resources via directory traversal attacks.

Wazzum Dating Software (userid) SQL Injection Vulnerability

Wazzum Dating Software is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to manipulate SQL queries and gain access to unauthorized information. This issue affects the 'userid' parameter of the 'profile_view.php' script.

PHP-CMS 1 Blind SQL Injection Exploit

This exploit is used to gain access to the admin panel of the PHP-CMS 1 application. It uses a blind SQL injection vulnerability to gain access to the admin panel. The exploit uses a function called query() to construct a malicious query and then uses the fsockopen() function to send the malicious query to the server. The exploit then uses the time() function to measure the response time of the server and if the response time is greater than 4 seconds, it means that the malicious query was successful and the exploit was successful.

WinFTP 2.3.0 post-auth remote exploit

This exploit allows a remote attacker to execute arbitrary code on a vulnerable system running WinFTP 2.3.0. The attacker must have valid credentials to authenticate to the FTP server. The exploit sends a specially crafted FTP command to the server, which allows the attacker to execute arbitrary code on the vulnerable system.

Recent Exploits: