header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Pragyan CMS v 3.0 => [Remote File Disclosure]

The vulnerability exists in the download.lib.php line 16 and index.php line 234. An attacker can exploit this vulnerability by sending a crafted HTTP request with the parameter 'fileget' set to '../../../../../../../../../../../../ etc/passwd . boot.ini' to download the file. Similarly, an attacker can download the config file by setting the parameter 'fileget' to '../../../../../../../../../../../../appserv/www/Pragyan/cms/config.inc.php' or '../../../../../../../../../../../../home/exploitdb/public_html/Pragyan/cms/config.inc.php'.

Enigma2 Webinterface 1.7.x 1.6.x 1.5.x remote root file disclosure exploit

This exploit allows an attacker to remotely access sensitive files on a vulnerable Enigma2 Webinterface. The exploit works by sending a specially crafted HTTP request to the vulnerable server, which then returns the contents of the requested file. The exploit is possible due to a lack of proper input validation in the application, which allows an attacker to access files outside of the intended directory.

Multiple Vulnerability on ClipBucket 2.6

ClipBucket 2.6 is vulnerable to Cross Site Scripting and SQL Injection. The vulnerable parameters are cat, seo_cat_name, sort, time, cid, type, collection, item. An attacker can inject malicious JavaScript code and SQL queries in these parameters to execute arbitrary code and access sensitive information.

Paddelberg’s topsite-script admin auth bypass

This exploit allows an attacker to bypass the authentication of the Paddelberg's topsite-script admin page. The attacker can create a cookie with the host name, path name, cookie name set to 'xxxtopa' and cookie value set to ':'. Then, the attacker can visit the admin page and gain access to the page without authentication.

GPSMapEdit v1.1.73.2 (.lst) Local Denial of Service Vulnerability

GPSMapEdit v1.1.73.2 is vulnerable to a local denial of service attack. By creating a specially crafted .lst file containing 512 'A' characters, an attacker can cause the application to crash when the file is opened.

Recent Exploits: