header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

DodosMail <= 2.0.1(dodosmail.php) Remote File Include Vulnerability

DodosMail 2.0.1 is vulnerable to a remote file include vulnerability. An attacker can exploit this vulnerability by sending a malicious URL in the dodosmail_header_file and dodosmail_footer_file parameters of the dodosmail.php script. This will allow the attacker to execute arbitrary code on the vulnerable system.

irayoblog-alpha-0.2.4

A remote file inclusion vulnerability exists in irayoblog-alpha-0.2.4. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing a malicious URL in the irayodirhack parameter. This can allow the attacker to execute arbitrary code on the vulnerable system.

Vortex Blog AKA vBlog Remote File Inclusion Vulnerability

Vortex Blog AKA vBlog is prone to a remote file inclusion vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.

Multiple Cross-Site Scripting Vulnerabilities in txtForum

txtForum is prone to multiple cross-site scripting vulnerabilities due to a failure in the application to properly sanitize user-supplied input. An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

iPrimal Forums Remote File Inclusion

A remote file inclusion vulnerability exists in iPrimal Forums due to insufficient sanitization of user-supplied input to the 'p' parameter in the 'admin/index.php' script. An attacker can exploit this vulnerability to include arbitrary remote files, allowing for the execution of arbitrary code on the vulnerable system.

HER0

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the '_mygamefile' parameter to '/ad_main.php' script. A remote attacker can send a specially crafted HTTP request with malicious code in the '_mygamefile' parameter, which will be included and executed by the vulnerable script. This can be exploited to execute arbitrary PHP code on the vulnerable system.

iWare Pro <= 5.0.4 (chat_panel.php) Remote Code Execution Vulnerability

iWare admin/mods/simplechat_1.0.0/chat_panel.php does not sanatize the $message variable in the first argument of the PostMessage() function on line 11 before writing the variable contents to chat_log.php on line 25. When chat_panel.php is requested, the PostMessage() function is called on line 32 and $_REQUEST['msg'] is written to chat_log.php unsanatized.

Php Giggle <= 12.08 Remote File Include Vulnerability

The vulnerability exists in the startup.php file, which allows an attacker to include a remote file by manipulating the CFG_PHPGIGGLE_ROOT parameter. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing an arbitrary file from a remote server.

Recent Exploits: