header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Wireless Photo Transfer v3.0 iOS – File Include Vulnerability

A local file include web vulnerability has been discovered in the official wireless photo transfer mobile v3.0 iOS application. The file include vulnerability allows remote attackers to unauthorized include local file/path requests or system specific path commands to compromise the mobile web-application. The web vulnerability is located in the `album-title` value of the `file upload` module. Remote attackers are able to inject own files with malicious `filename` values in the `file upload` POST method request to compromise the mobile web-application. The local file/path include execution occurs in the index file dir listing and sub folders of the wifi interface.

cattaDoc 2.21(download2.php fn1) Remote File Disclosure Vulnerability

The cattaDoc 2.21 version is vulnerable to a remote file disclosure vulnerability. The exploit allows an attacker to disclose files from the server by exploiting the 'download2.php' script. By manipulating the 'fn1' parameter in the URL, an attacker can traverse the directory structure and access sensitive files such as the '/etc/passwd' file.

MyBulletinBoard (MyBB) Remote Code Execution Exploit

This exploit allows remote code execution on MyBulletinBoard (MyBB) version 1.2.3 and below. It takes advantage of a SQL vulnerability that allows injection of malicious code. By exploiting this vulnerability, an attacker can upload a backdoor file and potentially gain full control over the target system.

Skysa App Bar Plugin for WordPress Cross-Site Scripting Vulnerability

The Skysa App Bar Plugin for WordPress is prone to a cross-site-scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

Lanoba Social Plugin for WordPress Cross-Site Scripting Vulnerability

The Lanoba Social Plugin for WordPress is vulnerable to a cross-site scripting (XSS) vulnerability due to improper input sanitization. An attacker can exploit this vulnerability to execute arbitrary script code in the browser of a user visiting the affected site, potentially leading to the theft of authentication credentials and other attacks.

Symantec Web Gateway 5 restore.php Post Authentication Command Injection

This module exploits a command injection vulnerability found in Symantec Web Gateway's setting restoration feature. The filename portion can be used to inject system commands into a syscall function, and gain control under the context of HTTP service. For Symantec Web Gateway 5.1.1, you can exploit this vulnerability by any kind of user. However, for version 5.2.1, you must be an administrator.

vBulletin 4.x.x ‘visitormessage.php’ Remote Code Injection Vulnerability

The vulnerability allows an attacker to inject and execute arbitrary code on a vBulletin server. The attack involves registering on the vBulletin website, posting a message in the visitor message section, and manipulating the message data to include the malicious code. The code is executed when the message is viewed by another user. The vulnerability was discovered by Dariush Nasirpour (Net.Edit0r) in 2015.

Cross-Site Scripting Vulnerability in EvoLve WordPress Theme

The EvoLve theme for WordPress is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

Recent Exploits: