header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

HTTP Upload Tool For PHP 1.0 Information Disclosure

The download.php file in Upload Tool for PHP neither verifies that a requestor has authenticated, nor performs any sanity checking on the file being requested. This allows an unauthenticated user to download any file which the web server has read rights to, including the users.conf file which contains a list of Upload Tool's users and their hashed passwords.

Kerio Webstar 5.4.2 Remote Root Exploit

This exploit allows an attacker to gain root access to a vulnerable Kerio Webstar 5.4.2 server. The attacker must have access to the webstar user or be in the admin group. The exploit creates a malicious library file and then executes the vulnerable binary, which loads the malicious library and grants the attacker root access.

Links smbclient command execution

Links web browser versions 1.00pre12 and earlier are vulnerable to command injection due to a flaw in the smb_func() function in smb.c. This flaw allows malicious web sites to execute smbclient commands on the victim's machine, allowing the attacker to read any file from the victim system (any file that the user running links has read access), or to upload any file to the victim system (any file that the user running links can create/overwrite).

NetVios <= 2.0 [News Application] (page.asp) Remote SQL Injection Vulnerability

NetVios <= 2.0 is vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to sensitive information stored in the database, such as usernames and passwords.

ASP Smiley v1.0 (default.asp) Remote Login ByPass SQL Injection Vulnerability

A vulnerability in ASP Smiley v1.0 (default.asp) allows an attacker to bypass authentication and gain access to the application by sending a specially crafted SQL injection payload to the application. This payload can be sent as part of the username parameter when attempting to log in.

Web based bibliography management system

The script _basicfunctions.php does not specify a value for the $DIR variable before including it. An attacker can exploit this vulnerability by sending a crafted HTTP request with a malicious value for the $DIR variable. This can lead to remote code execution.

Recent Exploits: