header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Evernewjoke Script

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'start' and 'cat_id' parameters to 'joke-archives.php' script. A remote attacker can execute arbitrary SQL commands in application's database, inject arbitrary HTML and script code, access or modify sensitive data, exploit vulnerabilities in the underlying database and operating system, etc.

Easy Px 41 CMS v09.00.00B1 (fiche) Local File Include Exploit

This exploit allows an attacker to include a local file on the server, such as the /etc/passwd file. The exploit is triggered by sending a specially crafted HTTP request to the vulnerable server, containing the path to the local file in the 'fiche' parameter. The exploit is successful if the server responds with the contents of the local file.

Joomla Component com_agoragroup (id) Blind SQL-injection Vulnerability

A vulnerability exists in the Joomla Component com_agoragroup (id) which allows an attacker to inject malicious SQL code into the application. This can be exploited to gain access to sensitive information such as usernames and passwords. The vulnerability is due to insufficient input validation of the 'id' parameter. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL code. This can be used to gain access to sensitive information such as usernames and passwords.

Million Dollar Text Links Insecure Cookie Handling Vulnerability

Million Dollar Text Links 1.0 is vulnerable to an insecure cookie handling vulnerability. An attacker can exploit this vulnerability by sending a malicious JavaScript code to the victim. The malicious code will set a cookie with the userid set to 1, allowing the attacker to gain access to the application.

Dokuwiki 2009-02-14 Remote/Temporary File Inclusion exploit

Dokuwiki 2009-02-14 is vulnerable to Remote/Temporary File Inclusion. This exploit requires register_globals to be set to 'on' and allow_url_fopen to be set to 'On' (default) and allow_url_include to be set to 'On' (not default). The exploit can also be used with file_uploads set to 'On' (default) and a temporary file passed by the $_FILES[] array. The payload should be a shell script with the command passthru($_GET[cmd]); die();.

Joomla Component Com_Agora 3.0.0 RC1 Remote File Upload Vulnerability

A remote file upload vulnerability exists in Joomla Component Com_Agora 3.0.0 RC1. An attacker can exploit this vulnerability to upload arbitrary code and execute it in the context of the webserver process. This can be exploited to compromise the web application and the underlying system. The vulnerability is due to insufficient validation of user-supplied input in the 'task' parameter of the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious code to the vulnerable script. Successful exploitation of this vulnerability can result in arbitrary code execution in the context of the webserver process.

WebMember 1.0 (formID) Remote SQL Injection Vulnerability

WebMember 1.0 (formID) is vulnerable to a remote SQL injection vulnerability. This vulnerability allows an attacker to inject arbitrary SQL code into the vulnerable application. This can be exploited to gain access to the database and to execute arbitrary commands on the system. The vulnerability is caused due to the formID parameter not being properly sanitized before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

ZeeCareers v2.0 (addadminmembercode.php) [ Add Admin ]

ZeeCareers v2.0 is vulnerable to Insecure Direct Object Reference. The addadminmembercode.php script does not properly validate user-supplied input, allowing an attacker to inject arbitrary code into the application. This can be exploited to add an admin user to the application.

phpBugTracker 1.0.3 Path Disclosure Vulnerability

A vulnerability in phpBugTracker 1.0.3 allows an attacker to gain access to the application's path by sending a specially crafted HTTP request. By exploiting this vulnerability, an attacker can gain access to the application's path and use it to launch further attacks.

Flash Image Gallery 1.1 Sensitive Data Disclosure

The vulnerability exists in the Flash Image Gallery 1.1 and maybe last version. An attacker can access the config.xml file which contains the admin username and password. The attacker can then use this information to gain access to the admin panel and upload malicious files.

Recent Exploits: