header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

phpAutoVideo csrf

A Cross-Site Request Forgery (CSRF) vulnerability exists in phpAutoVideo, which allows an attacker to change the admin password by sending a malicious request. The malicious request contains a hidden form with the parameters 'admintype' set to 'changepass', 'passworda' and 'passwordb' set to 'z3r0'. When the victim visits the malicious page, the form is automatically submitted and the admin password is changed.

Easy~Ftp Server v1.7.0.2 (HTTP) Remote BOF Exploit

A buffer overflow vulnerability exists in Easy~Ftp Server v1.7.0.2 (HTTP) which could allow a remote attacker to execute arbitrary code on the vulnerable system. Authentication is not required to exploit this vulnerability. The vulnerability is due to a boundary error when handling HTTP requests. An attacker could exploit this vulnerability by sending a specially crafted HTTP request containing an overly long string to the vulnerable server. This may allow the attacker to execute arbitrary code on the vulnerable system.

Core Design Scriptegrator plugin for Joomla! 1.5 file inclusion

There's a file called jsloader.php which takes an array of file names from the HTTP GET parameters and calls include() on every one of them. The problem is that the only protection is the is_file() call (therefore it cannot be used for remote file inclusion), so it's trivial to exploit this vulnerability to execute the PHP interpreter on any file on the target system the httpd user can read.

gitWeb remote command execution

The cgi script doesn't show the command output *blind command execution ;)*. Vulnerable functions in gitweb.cgi: git_snapshot(), git_search(), git_object(). An example exploit URL is http://server/cgi-bin/gitweb.cgi?p=sample.git/.git;a=object;f=program.c;h=e69de29bb2d1d6434b8b29ae775ad8c2e48c5391|`touch$IFS/tmp/file.txt`|;hb=9adaf5b35bb6415497d23f089660567227ea3785

CubeCart (index.php) Sql Injection Vulnerability

CubeCart is vulnerable to a SQL injection vulnerability in the index.php file. This vulnerability allows an attacker to execute arbitrary SQL commands on the vulnerable system. The vulnerability is due to the lack of proper sanitization of user-supplied input in the "productId" parameter. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL commands.

Joomla Component com_otzivi Local File Inclusion

An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable application. The attacker can use the ‘controller’ parameter to inject malicious code into the application. This code can be used to read sensitive files from the server.

Recent Exploits: