header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

The Classified Ad System 1.0 (main) Remote SQL Injection Exploit

The Classified Ad System 1.0 (main) is vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. This request contains a malicious SQL query that can be used to extract sensitive information from the database, such as usernames and passwords. The attacker can then use this information to gain unauthorized access to the system.

Okul Merkezi Portal v1.0

A remote file inclusion vulnerability exists in Okul Merkezi Portal v1.0. An attacker can exploit this vulnerability to execute arbitrary code on the vulnerable system. This is achieved by sending a maliciously crafted HTTP request containing a URL in the 'page' parameter of the 'ataturk.php' script. This can allow an attacker to execute arbitrary code on the vulnerable system.

Fishyshoop Security Vulnerability

This exploit allows an attacker to bypass authentication and register as an admin on Fishyshoop, a web application. The exploit uses the WWW::Curl::Easy Perl module to send a POST request to the Fishyshoop root URL with the desired username and password, and the is_admin parameter set to 1. This allows the attacker to register as an admin without any authentication.

Ciberia 1.0<(Ciberia Content Federator)>(maquetacion_socio.php) Remote File Inclusion Exploit

This exploit allows an attacker to include a remote file on the vulnerable server through the vulnerable parameter 'path' in the 'maquetacion_socio.php' file. The vulnerable code includes three files, 'datos_socios.php', 'elementos/actos.php' and 'datos/datos_ciberinvitados.php', which can be accessed remotely by an attacker. The exploit was discovered by the DeltahackingTEAM and was published in 2008.

Irokez CMS <= 0.7.1 Multiple Remote File Include Vulnerabilities

Irokez CMS has several scripts which do not initialize variables before using them to include files, assuming register_globals = on, we can initialize any one of the variables in a query string and include a remote file of our choice.

PhpbbXtra v2.0 (phpbb_root_path) Remote File Include Vulnerability

A vulnerability exists in PhpbbXtra v2.0, which allows a remote attacker to include a file from a remote location. The vulnerability is due to the 'includes/archive/archive_topic.php' script not properly sanitizing user-supplied input to the 'phpbb_root_path' parameter. An attacker can exploit this vulnerability to include arbitrary files from remote locations, resulting in arbitrary code execution on the vulnerable system.

bugs for Endonesia8.4

Multiple XSS and SQL Injection vulnerabilities in Endonesia8.4 allow remote attackers to inject arbitrary web script or HTML, and execute arbitrary SQL commands via the (1) mod parameter in mod.php, (2) friend parameter in friend.php, (3) maintext parameter in admin.php, (4) intypeid parameter in mod.php, (5) cid parameter in mod.php, (6) did parameter in mod.php, (7) cid parameter in katalog.php, and (8) cid parameter in diskusi.php, and allow remote attackers to execute arbitrary commands via the did parameter in diskusi.php.

Jinzora <= 2.7 (include_path) Multiple Remote File Include Vulnerabilities

Jinzora has several scripts which do not initialize variables before using them to include files, assuming register_globals = on, we can initialize any one of the variables in a query string and include a remote file of our choice.

Recent Exploits: