header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Image file upload Upload Shell Vulnerability

A vulnerability exists in Image file upload by Bloody (http://www.bloodys.com/)!talian script, which allows an attacker to upload a malicious shell on the server. The vulnerability is due to insufficient validation of the uploaded file, allowing an attacker to upload a malicious shell on the server.

dB Masters Multimedia Insecure Cookie Handling Vulnerability

An attacker can exploit this vulnerability by sending a maliciously crafted URL to the target user. The URL contains a malicious JavaScript code which is executed in the user's browser when the URL is accessed. The malicious code can be used to set a cookie with the name 'admin_log' and value 'indoushka' and path '/'. This allows the attacker to login to the application without a password.

e-cart 3.0 Multiple Vulnerabilities

e-cart 3.0 is vulnerable to Backup, Upload Shell and RFI vulnerabilities. An attacker can exploit these vulnerabilities to gain access to the system and execute malicious code. The Backup vulnerability allows an attacker to access the backup files of the system. The Upload Shell vulnerability allows an attacker to upload a malicious file to the system. The RFI vulnerability allows an attacker to inject malicious code into the system.

e-pay 1.55 RFI Vulnerability

The vulnerability exists in e-pay 1.55, which allows a remote attacker to include a remote file via the '_REQUEST[read]' parameter in 'a_affil.php' and 'popup.php' scripts. An attacker can exploit this vulnerability to execute arbitrary code on the vulnerable system.

Lizard Cart Upload Shell Vulnerability

An attacker can upload a malicious shell to the vulnerable Lizard Cart application by exploiting the upload feature. The malicious shell can be uploaded in the form of .php, .html, .pl, and .asp files. The uploaded shell can be accessed from the graphics folder of the application.

ES Simple Uploader v 1.1 Upload Shell Vulnerability

ES Simple Uploader v 1.1 is vulnerable to an upload shell vulnerability. An attacker can exploit this vulnerability by uploading a malicious file to the uploads/images/ directory, which can be accessed via the URL http://server/script/uploads/images/Ev!l.php. The attacker can then execute arbitrary code on the server.

FreeForum 1.7 Cross Site Scripting Vulnerability

A Cross Site Scripting (XSS) vulnerability exists in FreeForum 1.7, which allows remote attackers to inject arbitrary web script or HTML via the index.php and/or the ? parameters. An attacker can exploit this vulnerability to execute malicious JavaScript code in the browser of an unsuspecting user in the context of the affected site.

EZPX My photoblog Upload Shell Vulnerability

A vulnerability in EZPX My photoblog allows an attacker to upload a malicious shell to the server. The attacker can access the shell by visiting the URL http://server/ezpx-1.2-beta/index.php?/admin/photos/upload and http://server/ezpx-1.2-beta/content/photos.

Recent Exploits: