header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Multiple input-validation vulnerabilities in Simple one-file gallery

Simple one-file gallery is prone to multiple input-validation vulnerabilities, including a local file-include issue and a cross-site scripting issue. An attacker can exploit these issues to steal cookie-based authentication credentials and to view and execute arbitrary local files within the context of the affected webserver. Other attacks are also possible.

Simple one-file gallery input-validation vulnerabilities

The Simple one-file gallery is prone to multiple input-validation vulnerabilities, including a local file-include issue and a cross-site scripting issue. An attacker can exploit these issues to steal cookie-based authentication credentials and to view and execute arbitrary local files within the context of the affected webserver. Other attacks are also possible.

Local File Inclusion Vulnerability in xt:Commerce

The xt:Commerce e-commerce platform is prone to a local file-include vulnerability due to improper sanitization of user-supplied input. This vulnerability allows an unauthorized user to view files and execute local scripts by manipulating the 'template' parameter in a specific URL.

Local File Include Vulnerability in Shop Kit Plus

Shop Kit Plus is prone to a local file-include vulnerability because it fails to adequately sanitize user-supplied data. An attacker can exploit this vulnerability using directory-traversal strings to execute local script code in the context of the application. This may allow the attacker to access sensitive information that may aid in further attacks.

LoveCMS Multiple Input-Validation Vulnerabilities

An attacker can exploit these issues to steal cookie-based authentication credentials, upload an arbitrary PHP file, execute the file on the vulnerable computer in the context of the webserver process, retrieve arbitrary files from the vulnerable system in the context of the affected application, and delete arbitrary files on the server.

Multiple input-validation issues in Simple Plantilla PHP

Attackers can exploit the local file-include vulnerability by using directory-traversal strings to execute local script code in the context of the application. Attackers can also exploit the arbitrary file-upload vulnerability to execute malicious PHP code in the context of the webserver process. Exploiting these issues may allow attackers to compromise the application and the underlying system or access sensitive information.

Pyrophobia Multiple Input-Validation Vulnerabilities

Pyrophobia is prone to multiple input-validation vulnerabilities, including multiple local file-include issues and multiple cross-site scripting issues. An attacker can exploit these issues to steal cookie-based authentication credentials, view files, and execute local scripts within the context of the affected webserver. Other attacks are also possible.

Recent Exploits: