header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Opencourrier 2.03beta (RFI/LFI) Multiple File Include Vulnerability

The vulnerability is caused due to the use of user-supplied input without proper validation. This can be exploited to include arbitrary local or remote files by passing malicious parameters to the vulnerable script.

OpenCominterne 1.01 Local File Include Vulnerability

OpenCominterne 1.01 is vulnerable to a local file include vulnerability which allows an attacker to include a file from the local system or a remote system. This vulnerability can be exploited by an attacker to gain access to sensitive information or to execute malicious code on the vulnerable system.

WebEssence 1.0.2 Multiple Vulnerabilities

WebEssence 1.0.2 is vulnerable to Cross-Site Scripting (XSS), Remote Shell Upload and Remote Blind SQL Injection. An unprivileged registered user can upload any PHP or ASP file that can be found in 'uploads/other/'. An attacker can inject a remote HTML page in the 'url' variable. An attacker can also use a Blind SQL Injection attack to extract the username and MD5 password of the admin user.

TR Forum 1.5 insert admin CSRF Vulnerability

A CSRF vulnerability exists in TR Forum 1.5, which allows an attacker to insert an admin user by sending a maliciously crafted request. The attacker can craft a malicious HTML page containing a form with the necessary parameters to add an admin user, and then send it to a victim. When the victim visits the page, the form will be automatically submitted, and the attacker will gain admin access to the forum.

Invision power board 0-day denial of service 2

This exploit allows an attacker to send a large number of requests to a server running Invision power board, resulting in a denial of service attack. The exploit is written in Perl and works on all versions of Invision power board. It can be used to DOS the whole server.

phpegasus (fckeditor) Remote Arbitrary File Upload Exploit

A vulnerability exists in phpegasus (fckeditor) which allows an attacker to upload arbitrary files on the server. This is due to the fact that the 'Enabled' parameter in the config.php file is set to true by default, allowing an attacker to upload a malicious file using the upload.php file. This can be exploited to execute arbitrary code on the server.

Recent Exploits: