header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PEAR v.1.9.0 Multiple Remote File Inclusion Vulnerability

An attacker can exploit this vulnerability by sending a crafted URL to the vulnerable application. The crafted URL contains the malicious payload in the include_path or _PEAR_PHPDIR parameter which will be processed by the vulnerable application. This can result in arbitrary remote code execution on the vulnerable system.

WordPress >= 2.9 Failure to Restrict URL Access

WordPress implemented a new feature in version 2.9 that allowed users to retrieve posts that they may have deleted by accident. This new feature was labeled 'trash'. Any posts that are placed within the trash are only viewable by authenticated privileged users. However, when WordPress implemented the new feature they failed to change the permissions granted when the post is in the trash, meaning that an authenticated user can view the post regardless of their privilege level.

Internet Explorer 8 (Multitudinous looping )Denial of Service Exploit

The flaw exists within 'history go' ActiveX control which contains stack based overflow conditions. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page.

ZeusCMS v0.2 (DBD/LFI) Multiple Vulnerabilities

ZeusCMS is yet another Content Management System which is vulnerable to Database Backup Dump and Local File Include. An attacker can download the backup.sql file from the target website and can also include local files using the Local File Include vulnerability.

WSN Guest 1.02 SQL Injection Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input in the 'orderlinks' parameter of the 'index.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database. This can allow the attacker to steal sensitive information from the database, modify application data, exploit various vulnerabilities in the underlying SQL server etc.

Mozilla Firefox 3.6 (Multitudinous looping )Denial of Service Exploit

The flaw exists when the attacker put window.printer() funtion in multitudinous loop.User interaction is required to exploit this vulnerability in that the target must visit a malicious web page.

Southburn Web SQL Injection Vulnerability

An attacker can exploit a SQL injection vulnerability in Southburn Web to gain access to the userindex table and extract the usernames and passwords of all users. The exploit is achieved by appending '+and+1=2+union+select+1,group_concat(id,0x3a,username,0x3a,password),3,4,5,6,7,8,9,10,11,12,13,14,15,16+from+userindex-- -' to the vulnerable URL.

Recent Exploits: