header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

speedberg <= 1.2beta1 Remote File Inclusion

Speedberg version 1.2beta1 is vulnerable to a Remote File Inclusion vulnerability. This vulnerability allows an attacker to include a remote file, usually through a malicious URL, containing arbitrary code which is then executed on the vulnerable server. This vulnerability is due to the application not properly sanitizing user-supplied input to the 'SPEEDBERG_PATH' parameter in multiple files.

Net_DNS: Remote File Inclusion by ToXiC CreW

Net_DNS is vulnerable to a remote file inclusion vulnerability due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable application. This URL can be used to execute arbitrary code on the vulnerable system.

Another Mambo Module Remote Inclusion Vulnerability

A remote inclusion vulnerability was found in the MambWeather module, specifically in the file MambWeather/Savant2/Savant2_Plugin_options.php. An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable server, containing a malicious URL in the mosConfig_absolute_path parameter.

PHP Generator of Object SQL Database (path) Remote File Include Vulnerability

A remote file include vulnerability exists in the PHP Generator of Object SQL Database (PGOSD) script. The vulnerability is due to the 'path' parameter in the 'function.php3' script not properly sanitized before being used in a 'include' PHP function. This can be exploited to include arbitrary remote files by passing a URL in the 'path' parameter. Successful exploitation requires that 'register_globals' is set to 'on'.

Open Meetings Filing Application (PROJECT_ROOT) Remote File Include Vulnerability

Open Meetings Filing Application is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code within the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.

RSSonate remote Command Execution Vulnerabilities

The RSSonate application is vulnerable to remote command execution. An attacker can exploit this vulnerability by sending a maliciously crafted request to the vulnerable application. The vulnerable parameters are PROJECT_ROOT in xml2rss.php, config_local.php, rssonate.php, sql2xml.php, and xml2rss.php. The attacker can inject arbitrary commands into the vulnerable parameters and execute them on the server.

WGCC Beta <= 0.5.6 (quiz.php) Remote SQL InJection Vulnerability

An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. The attacker can inject arbitrary SQL code in the vulnerable parameter 'qzid' of the 'quiz.php' script. This can be used to bypass authentication, access, modify or delete data from the back-end database.

Recent Exploits: