header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Lithium CMS <= 4.04c Remote Code Execution Exploit

This exploit allows remote attackers to execute arbitrary code on vulnerable installations of Lithium CMS. Authentication is not required to exploit this vulnerability. The vulnerability is due to the 'index.php' script not properly sanitizing user-supplied input to the 'news_id' parameter. An attacker can exploit this vulnerability to execute arbitrary code under the context of the webserver process.

Tikiwiki version 1.9.5 (CVS) -Sirius- (PoC)

An anonymous user can dump the MySQL user & passwd just by creating a MySQL error with the 'sort_mode' var, with the following links: /tiki-listpages.php?offset=0&sort_mode=, /tiki-lastchanges.php?days=1&offset=0&sort_mode=, /messu-archive.php?sort_mode=, /messu-mailbox.php?sort_mode=, /messu-sent.php?sort_mode=, /tiki-directory_add_site.php?sort_mode=, /tiki-directory_ranking.php?sort_mode=, /tiki-directory_search.php?sort_mode=, /tiki-forums.php?sort_mode=, /tiki-view_forum.php?forumId=, /tiki-friends.php?sort_mode=, /tiki-list_blogs.php?sort_mode=, /tiki-list_faqs.php?sort_mode=, /tiki-list_trackers.php?sort_mode=, /tiki-list_users.php?sort_mode=, /tiki-my_tiki.php?sort_mode=, /tiki-notepad_list.php?sort_mode=, /tiki-orphan_pages.php?sort_mode=, /tiki-shoutbox.php?sort_mode=, /tiki-usermenu.php?sort_mode=, /tiki-webmail_contacts.php?sort_mode=. There is also a XSS vulnerability at /tiki-featured_link.php?type=f&url=" ></iframe><scr</script>ipt>alert('XSS')</scri</script>pt> <!--

2BGal 3.0 Remote Command Execution Exploit

2BGal 3.0 is vulnerable to a remote command execution vulnerability due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server, which can lead to arbitrary code execution. The exploit code provided by Kw3[R]Ln from Romanian Security Team can be used to exploit this vulnerability.

Innovate Portal <= 2.0 Remote Code Execution Exploit

Innovate Portal version 2.0 is vulnerable to remote code execution. This vulnerability exists due to insufficient sanitization of user-supplied input in the 'content' parameter of the 'acp.php' script, and the 'avatar' parameter of the 'usercp.php' script. An attacker can exploit this vulnerability to upload arbitrary PHP code and execute it in the context of the webserver process.

Gotfault Security – Advisory #05 – 27/10/06

Mozilla Firefox is prone to a D.O.S within its javascript Range object. In a special condition, a NULL Pointer Deference occur and Firefox crashes. When a DOCUMENT_TYPE_NODE (<!DOCTYPE...) element is passed to selectNode method and trigger a NULL Pointer deference when calling createContextualFragment method.

gepi 1.4.0

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'filename' parameter to the 'savebackup.php' script. This can be exploited to include arbitrary files from remote hosts and execute arbitrary PHP code. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable script. The code in the test.txt file contains a passthru command which can be used to execute arbitrary commands on the vulnerable system.

Spider Friendly <= 1.3.10 (phpbb_root_path) Remote File Include Exploit

Spider Friendly 1.3.10 is a module of phpBB modified by Przemo. It is vulnerable to a Remote File Include vulnerability which allows an attacker to include a remote file containing arbitrary code and execute it on the vulnerable server. The vulnerability exists due to the 'phpbb_root_path' parameter in the 'modules_data.php' script not being properly sanitized before being used in a 'require_once' PHP function call.

Recent Exploits: