header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

phpMyConferences <= 8.0.2 Remote File Inclusion

phpMyConferences is vulnerable to a remote file inclusion vulnerability. This vulnerability exists due to insufficient sanitization of user-supplied input to the 'lvc_include_dir' parameter in the 'menus.inc.php' script. An attacker can exploit this vulnerability to execute arbitrary PHP code on the vulnerable system by including a malicious file from a remote location.

Redaction System 1.0000 – Remote Include Exploit

This exploit allows an attacker to execute arbitrary code on a vulnerable system by exploiting a Remote Code Inclusion vulnerability in Redaction System 1.0000. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'lang_prefix' parameter of the 'conn.php', 'index.php', 'sesscheck.php', 'wap/conn.php' and 'wap/sesscheck.php' scripts. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious code to the vulnerable system. Successful exploitation of this vulnerability can result in arbitrary code execution on the vulnerable system.

phpBB Ajax Shoutbox <= 0.0.5 (phpbb_root_path) Remote File Inclusion

A vulnerability in phpBB Ajax Shoutbox <= 0.0.5 allows remote attackers to include arbitrary files via the phpbb_root_path parameter in a URL. The vulnerable code is located in the shoutbox.php file, where the phpbb_root_path parameter is not properly sanitized before being used in a require_once() statement. This can be exploited to include arbitrary files from local or external resources.

phpBB Import Tools Mod <= 0.1.4 (phpbb_root_path) Remote File Inclusion

An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. This can allow the attacker to include a remote file containing arbitrary code, resulting in a compromise of the web server.

BulletProof FTP (Client) V2.45 0day Buffer Overflow PoC Exploit

A buffer overflow vulnerability exists in BulletProof FTP (Client) V2.45. The vulnerability is caused due to a boundary error within the handling of FTP requests. This can be exploited to cause a stack-based buffer overflow by sending an overly long, specially-crafted string to the affected server. Successful exploitation allows execution of arbitrary code.

phpht Topsites (phpht_real_path) Remote File Include Vulnerability

A remote file include vulnerability exists in PHPht Topsites, due to insufficient sanitization of user-supplied input to the 'phpht_real_path' parameter of the 'common.php' script. An attacker can exploit this vulnerability to include arbitrary remote files, allowing for the execution of arbitrary PHP code.

PHPBB insert user 0.1.2

A remote file include vulnerability exists in PHPBB insert user 0.1.2. An attacker can exploit this vulnerability to execute arbitrary code on the vulnerable system. This can be exploited by sending a specially crafted HTTP request containing a malicious URL to the vulnerable script.

Recent Exploits: