header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

encapscms 0.3.6 – Remote File Include by Firewall

encapscms 0.3.6 is vulnerable to a remote file include vulnerability. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request containing a URL in the 'root' parameter to the vulnerable application. This can allow the attacker to execute arbitrary code on the vulnerable system.

Heap Spray Exploit

Heap Spray Exploit is a technique used by attackers to inject malicious code into a vulnerable application. The attacker uses a heap spray to spray a large number of objects onto the heap, which can then be used to execute arbitrary code. The attacker can then use the heap spray to overwrite the return address of a function, allowing them to execute arbitrary code.

phpManta – Mdoc <= 1.0.2 (view-sourcecode.php) Local File Include Exploit

This exploit allows an attacker to gain access to the server by exploiting a vulnerability in the phpManta - Mdoc <= 1.0.2 (view-sourcecode.php) application. The vulnerability is caused due to the improper validation of user-supplied input in the 'file' parameter of the 'view-sourcecode.php' script. This can be exploited to include arbitrary local files from the web server and execute arbitrary PHP code.

MyAlbum <= 3.02 (langs_dir) Remote File Inclusion Vulnerability

MyAlbum version 3.02 and possibly other versions are vulnerable to a remote file inclusion vulnerability. The vulnerability is due to the 'langs_dir' parameter in the language.inc.php script not being properly sanitized before being used in an include statement. This can be exploited to include arbitrary files from remote hosts resulting in arbitrary code execution on the vulnerable system.

1WebCalendar SQL Injection Vulnerabilities

1WebCalendar is prone to multiple SQL-injection vulnerabilities due to a failure in the application to properly sanitize user-supplied input before using it in SQL queries. A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

LetterIt (RFI)

LetterIt is vulnerable to a Remote File Inclusion (RFI) vulnerability. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable application. The malicious URL can be used to execute arbitrary code on the vulnerable system. The malicious URL can be sent via a GET request to the vulnerable application. The vulnerable parameter is the 'lang' parameter in the 'session.php' file. An attacker can use this parameter to inject malicious code into the vulnerable application.

Zoo Local Buffer-Overflow Vulnerability

Zoo is prone to a local buffer-overflow vulnerability. This issue is due to a failure in the application to do proper bounds checking on user-supplied data before using it in a finite-sized buffer. An attacker can exploit this issue to execute arbitrary code in the context of the victim user running the affected application to potentially gain elevated privileges.

Recent Exploits: