header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Paristemi 0.8.3b (buycd.php) Remote File Include Vulnerability

Paristemi music/buycd.php fails to initialize the $HTTP_DOCUMENT_ROOT variable before using it to include files, assuming register_globals = on, we can initialize the variable in a query string and include a remote file of our choice.

KDE 3.5 | libkhtml <= 4.2.0 / Unhandled HTML Parse Exception

KDE 3.5 and earlier versions are vulnerable to an unhandled HTML parse exception. This vulnerability is caused due to an error in the 'DOM::Node::nodeType()' function in 'libkhtml.so.4' library when handling HTML tags with a range attribute. This can be exploited to cause a denial of service via a specially crafted HTML page.

Intel Wireless Mini-PCI Driver Remote Race Condition Memory Corruption Flaw

The intel wireless mini-pci driver provided with Intel 2200BG cards is vulnerable to a remote race condition memory corruption flaw. Malformed beacons frame can be used to corrupt internal kernel structures, leading to arbitrary code execution. This vulnerability is triggered when flooding wifi card with many malformed beacons frame. The data is copied over internal kernel structures, resulting in memory operations being performed on attacker-controlled pointer values, like EIP values.

wget <= 1.10.2 | Unchecked Boundary Condition

A vulnerability in wget version 1.10.2 and earlier allows an attacker to cause a denial of service (DoS) by sending a specially crafted FTP response. The vulnerability is due to an unchecked boundary condition when processing FTP responses. An attacker can exploit this vulnerability by sending a specially crafted FTP response to a vulnerable wget instance. Successful exploitation of this vulnerability will cause the wget instance to crash.

uploader&downloader v3 Remote SQL Injection Vulnerability

A remote SQL injection vulnerability exists in uploader&downloader v3. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to sensitive information stored in the database.

VerliAdmin <= 0.3 File Include Exploit

VerliAdmin 0.3 is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code within the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.

mxBB Module Charts <= 1.0.0(module_root_path) Remote File Include Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input in the 'module_root_path' parameter in 'charts_constants.php' script. A remote attacker can include arbitrary files from local resources and execute arbitrary PHP code on the vulnerable system.

mxBB Module WebLinks <= 2.05(mx_root_path) Remote File Include Vulnerability

The vulnerability exists due to the improper validation of user-supplied input in the 'mx_root_path' parameter in the '/modules/mx_links/language/lang_english/lang_admin.php' script. A remote attacker can exploit this vulnerability to execute arbitrary PHP code on the vulnerable system by passing a malicious URL in the 'mx_root_path' parameter.

Recent Exploits: