header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MkPortal Urlobox Cross Site Request Forgery

MkPortal is vulnerable to Cross Site Request Forgery (CSRF) attacks. An attacker can craft a malicious URL that, when visited by an administrator, will delete a message from the urlobox. The malicious URL is posting [img]?ind=urlobox&op=delete&idurlo=X[/img] in MkPortal urlobox where X is an ID of a message. When the administrator visits the URL, the message with the ID X will be deleted.

inertianews 0.02b Remote File Include Vulnerability

A vulnerability exists in inertianews 0.02b which allows a remote attacker to include a file from a remote host. The vulnerability is due to the 'inews_path' parameter in 'inertianews_main.php' not properly sanitized before being used in a 'require' statement. This can be exploited to include arbitrary files from remote hosts resulting in arbitrary remote code execution.

Ixprim 1.2 Remote Blind SQL Injection Exploit

This exploit is used to gain access to the Ixprim 1.2 CMS system by exploiting a blind SQL injection vulnerability. It searches for a comment posted on the system, then searches for the administrator's uid, username length, username, password hash, full path disclosure, and confidential ixp code.

PowerClan <= 1.14a (footer.inc.php) Remote File Include Vulnerability

PowerClan footer.inc.php does not initialize the $settings[footer] variable before using it to include files, assuming register_globals = on, we can initialize the variable in a query string and include a remote file of our choice.

DREAM FTP Server 1.0.2 (PORT) Denial of Service Exploit

Dream FTP v1.02 also has anonymous logins enabled by default which enables anyone to crash the server at will. But if the anonymous logins have been disabled try it with a another user/pass account. The exploit sends an evil buffer of 40 characters to the server, which causes the server to crash.

Newxooper-php v0.9.1(chemin) Remote File Include Vulnerability

Newxooper-php v0.9.1 is vulnerable to a remote file include vulnerability. The vulnerability exists in the compteur/mapage.php file, in line 37, where the variable $chemin is not properly sanitized before being used in a REQUIRE statement. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable script, which will then include and execute the malicious code.

PHPBuilder v0.0.2 Remote File Disclosure Vulnerability

A vulnerability in PHPBuilder v0.0.2 allows an attacker to read arbitrary files on the server by sending a specially crafted HTTP request. The vulnerability exists due to insufficient sanitization of user-supplied input to the 'filename' parameter of the 'htm2php.php' script. An attacker can exploit this vulnerability by sending a malicious HTTP request containing directory traversal sequences (e.g. '../../../../../etc/passwd') to the vulnerable script. Successful exploitation will result in the disclosure of sensitive information.

PHP Advanced Transfer Manager <= 1.30 Source Code Disclosure Exploit

This exploit allows an attacker to view the source code of the vulnerable application. The vulnerability exists due to insufficient sanitization of user-supplied input to the 'file' parameter in 'index.php' script. A remote attacker can send a specially crafted HTTP request with arbitrary file name and view the source code of the application.

Recent Exploits: