header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

ASPIntranet SQL-injection Vulnerability

ASPIntranet is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

PafileDB Login SQL injection

The vulnerability exists in the include/admin/auth.php file of the PafileDB 3.5.2 and 3.5.3 versions. An attacker can exploit this vulnerability by sending a crafted cookie with a username and password containing a SQL injection payload. This will allow the attacker to bypass authentication and gain access to the admin panel.

Jowamp WebInterface v2.1 Remote File Inclusion Vulnerability

A vulnerability in Jowamp WebInterface v2.1 allows an attacker to execute arbitrary code on the vulnerable system. This is achieved by sending a specially crafted HTTP request containing a malicious URL to the vulnerable system. The malicious URL contains a malicious script which is then executed on the vulnerable system.

F-Prot 4.6.6 .CHM Heap Overflow

F-Prot 4.6.6 is vulnerable to a heap overflow vulnerability when processing .CHM files. This vulnerability can be exploited by an attacker to execute arbitrary code on the vulnerable system. The vulnerability is caused due to a boundary error within the processing of the .CHM files. This can be exploited to cause a stack-based buffer overflow by tricking a user into opening a specially crafted .CHM file.

Cutenews AJ-Fork Remote File Inclusion Vulnerability

A vulnerability in Cutenews AJ-Fork could allow a remote attacker to include a file from a remote location. The vulnerability exists due to insufficient sanitization of user-supplied input to the 'cutepath' parameter in the 'inc/shows.inc.php' script. An attacker could exploit this vulnerability by sending a specially crafted HTTP request containing an arbitrary file from a remote location. Successful exploitation could result in arbitrary code execution.

QuickCart 2.0 Local File Inclusion Exploit

QuickCart 2.0 is vulnerable to Local File Inclusion. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal sequences and a null byte (%00) to the vulnerable server. This will allow the attacker to read arbitrary files from the server.

Envolution <= 1.1.0 (PNSVlang) Remote Code Execution Exploit

Envolution version 1.1.0 and prior are vulnerable to a remote code execution vulnerability. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'PNSVlang' parameter in the 'error.php' script. An attacker can exploit this vulnerability to execute arbitrary code on the vulnerable system.

Recent Exploits: