header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PHP-Nuke News Rate Vulnerability

PHP-Nuke is vulnerable to Cross-site Scripting (XSS) and HTML Injection attacks due to insufficient sanitization and validation of user-supplied input. An attacker can exploit this vulnerability by sending a malicious payload to the vulnerable parameter 'score' in the 'modules.php?name=News&op=rate_complete&sid=6&score' URL. This will allow the attacker to execute arbitrary HTML and JavaScript code in the browser of the victim.

Power BB 1.8.3 Remote File Include

Power BB 1.8.3 is vulnerable to a remote file include vulnerability due to the use of the $_SERVER['DOCUMENT_ROOT'] variable in the include statement. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable server. The malicious URL contains the path to the attacker's malicious file, which is then included in the vulnerable application. This can lead to remote code execution on the vulnerable server.

SAPID-SHOP-1.3 Remote File Include Vulnerability

SAPID-SHOP-1.3 is vulnerable to a remote file include vulnerability. This vulnerability exists due to insufficient sanitization of user-supplied input in the 'root_path' parameter of the 'get_tree.inc.php' script. An attacker can exploit this vulnerability to include a remote file containing malicious code and execute it in the context of the webserver process. This can be exploited to gain access to the server.

System() and Exec() Vulnerability in MundiMail

The MundiMail software is vulnerable to command injection due to the use of System() and Exec() without proper security practices. An attacker can exploit this vulnerability by sending a malicious command in the 'mypid' and 'idtag' parameters of the 'status/index.php' page. This will allow the attacker to execute arbitrary commands on the server.

Notepad Remote File Inclusion Vulnerability

Notepad is vulnerable to a Remote File Inclusion (RFI) vulnerability which allows an attacker to include a remote file containing arbitrary code, resulting in arbitrary code execution on the vulnerable server. The vulnerability exists due to insufficient sanitization of user-supplied input to the 'GLOBALS[OCSP][DEFAULTCONFPATH]', 'GLOBALS[PROJECT][PHPINCPATH]' parameters in the 'newClient.php', 'index.php', 'calendar.php', 'forms/calendar.php' scripts. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing a malicious URL in the vulnerable parameter.

Orzex.py Format String Exploit

Orzex.py is a python script that exploits a format string vulnerability in the OrzHTTPd web server. The vulnerability is caused by improper handling of user-supplied input in the GET request. The exploit sends a specially crafted payload containing a format string to the vulnerable server, which can be used to overwrite the return address of the function and execute arbitrary code. The exploit also sends a trigger request to the server to execute the malicious code.

AIMP2 Unicode Buffer Overflow

AIMP2 is vulnerable to a buffer overflow vulnerability when a specially crafted Unicode string is passed as an argument to the application. This can be exploited to execute arbitrary code by overwriting the EIP register with a pointer to the shellcode. The exploit was demonstrated by corelanc0d3r on his blog and was encoded using Skylined's alpha2 encoder.

Thatware <= 0.5.3 Multiple Remote File Include Exploit

Thatware is vulnerable to multiple remote file include vulnerability. Attacker can exploit this vulnerability by sending malicious payloads to vulnerable parameters. For example, in config.php, line 4, attacker can send malicious payloads to root_path parameter. Similarly, in artlist.php, line 28, attacker can send malicious payloads to root_path parameter. In thatfile.php, line 130, attacker can send malicious payloads to root_path parameter.

Recent Exploits: