header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

AWCM v2.1 (LFI/Auth Bypass) Vulnerabilities

AWCM v2.1 is vulnerable to Local File Disclosure and Authentication Bypass. The Local File Disclosure vulnerability exists due to insufficient sanitization of user-supplied input in the 'a' parameter of the 'a.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable script. This can allow an attacker to read arbitrary files from the server. The Authentication Bypass vulnerability exists due to insufficient sanitization of user-supplied input in the 'username' and 'password' parameters of the 'login.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable script. This can allow an attacker to bypass authentication and gain access to the application.

GLinks v2.1 (cat) Remote Blind SQL Injection Vulnerability

GLinks v2.1 is vulnerable to a blind SQL injection vulnerability. This vulnerability allows an attacker to execute arbitrary SQL queries on the vulnerable system. The vulnerability is located in the 'cat' parameter of the 'index.php' script. An attacker can inject malicious SQL queries to the vulnerable parameter and execute them on the vulnerable system. This can be exploited to gain access to the vulnerable system and to gain access to sensitive data stored in the database.

e107 Plugin my_gallery 2.4.1 Exploit

e107 Plugin my_gallery 2.4.1 is vulnerable to a Remote File Inclusion vulnerability. This vulnerability allows an attacker to include a remote file, usually through a malicious URL, and execute it on the vulnerable server. This can lead to the attacker gaining access to sensitive information, such as passwords, or even full control of the server.

Winmod 1.4 (.lst) Local Stack Overflow Exploit

Winmod 1.4 is vulnerable to a local stack overflow vulnerability. This exploit was discovered by CWH Underground and tested on Windows XP SP2 EN. The exploit creates a malicious .lst file which contains a shellcode that can be used to execute arbitrary code on the vulnerable system.

Phorum 5.2.11 and prior XSS Vulnerability

Phorum's filtering engine insufficiently filters some BBcode arguments. Using the bbcode tags [color] and [size] it is possible to execute Javascript using expression CSS property. For IE6, the user can use the bbcode [color=#000000;background-image:url(javascript:alert('Sysdream_IE6_Alert'));]Sysdream Testing IE6[/color]. For IE7, the user can use the bbcode [color=#000000;xss:expression(alert('Sysdream_IE7_Alert'));]Sysdream Testing XSS[/color]. For Firefox and IE8, the user can upload an htc or xml file on the phorum using the 'My Files' function in 'Control Center' and use the bbcode [color=#000000;-moz-binding:url(http://127.0.0.1/phorum/file.php?0,file=9,filename=script.xml#mycode);]Sysdream Testing FF[/color] or [color=#000000;behavior:url(http://127.0.0.1/phorum/file.php?0,file=8,filename=script.htc);]Sysdream Testing FF[/color].

Web Business Directory 1.0 (search.php) Multiple Remote Vulnerabilities

The Web Business Directory 1.0 (search.php) is vulnerable to SQL Injection and XSS. An attacker can exploit this vulnerability by sending malicious SQL queries and XSS payloads to the vulnerable parameter 'st' in the search.php file.

Recent Exploits: