header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Max’s Image Uploader Shell Upload Vulnerability

Max's Image Uploader is vulnerable to a shell upload vulnerability. An attacker can upload a malicious file to the server and access it via the URL http://127.0.0.1/maxImageUpload/original/evil.php. This can be used to gain access to the server and execute arbitrary code.

MediaMonkey Standard Buffer Overflow

A buffer overflow vulnerability exists in MediaMonkey Standard 3.2.0, which could allow an attacker to execute arbitrary code on the vulnerable system. The vulnerability is due to a lack of proper validation of user-supplied input when handling a specially crafted MP3 file. An attacker can exploit this vulnerability by convincing a user to open a malicious MP3 file, resulting in arbitrary code execution in the context of the application.

Ebay Clone from (clone2009.com)

The Ebay Clone from clone2009.com is vulnerable to multiple SQL Injection vulnerabilities. The vulnerable files are gotourl.php, product_desc.php, view_items.php, bidhistory.php and view_feedback.php. An attacker can exploit these vulnerabilities by sending malicious SQL queries to the vulnerable parameters. For example, sending the following query to the vulnerable parameter 'id' in the file gotourl.php will redirect the user to the version of the website: [HOST]/[PATH]/gotourl.php?id=-1+union+select+version()--

SQL Injection & XSS in ITechSctipts Alibaba Clone

SQL Injection vulnerability exists in the cat_sell.php file, when the cid parameter is supplied with a malicious payload. An attacker can inject arbitrary SQL queries to the application. XSS vulnerability exists in the gen_confirm.php file, when the errmsg parameter is supplied with a malicious payload. An attacker can inject arbitrary JavaScript code to the application.

SQL Injection & XSS in CLONEBID B2B Marketplace

SQL Injection vulnerability exists in the 'selloffers.php' file, when the 'cid' parameter is supplied with malicious SQL code. XSS vulnerability exists in the 'gen_confirm.php' file, when the 'errmsg' parameter is supplied with malicious JavaScript code.

DasForum (layout) Local File Inclusion Exploit

DasForum is vulnerable to a Local File Inclusion vulnerability due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability by sending a crafted HTTP request with a malicious 'layout' parameter value. This will allow the attacker to include arbitrary local files on the server, which can lead to the disclosure of sensitive information or the execution of arbitrary code.

PHP-RESIDENCE <= 0.7.2 Multiple LFI Vulnerability

PHP-RESIDENCE version 0.7.2 is vulnerable to Local File Inclusion (LFI) vulnerability. This vulnerability works only when magic_quotes_gpc is set to off. An attacker can exploit this vulnerability by sending a crafted HTTP request with malicious payload to the vulnerable application. This will allow the attacker to include and execute arbitrary local files on the server.

Recent Exploits: