header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

File Download 1.3 Remote File Download Exploit

This particular php script,named as 'download.php' can be tricked into allowing a remote attacker to download all kinds of files such as .php,.txt etc etc.This can be achieved by adding a null byte followed by an allowed extension..for eg: http://www.site.com/download.php?f=/path/file.php%00.jpg

Quick ‘n Easy Web Server 3.3.5 Arbitrary File Disclosure Exploit

This exploit allows an attacker to access arbitrary files on a vulnerable Quick 'n Easy Web Server 3.3.5 system. The attacker can send a specially crafted HTTP request containing directory traversal characters (../../) to the vulnerable server, which will then return the contents of the requested file. This vulnerability is due to the lack of proper input validation in the application.

VisionLMS 1.0 | Change Password

A vulnerability in VisionLMS 1.0 allows an attacker to remotely change the password of any user. The vulnerability is due to insufficient validation of user-supplied input in the 'Password' parameter of the 'changePW.php' script. An attacker can exploit this vulnerability by sending a malicious request to the vulnerable script. Successful exploitation will result in the attacker being able to change the password of any user.

Recent Exploits: