header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

AEDating (all versions) Remote File inclusion.

A vulnerability exists in AEDating (all versions) which allows a remote attacker to include a file from a remote host. The vulnerability is due to the application including files based on user-supplied input without proper validation. An attacker can exploit this vulnerability to include arbitrary files from remote hosts, which can lead to the execution of arbitrary code on the vulnerable system. This can be exploited by sending a specially crafted HTTP request containing directory traversal sequences and a URL to a malicious host.

PHPQuiz <= v.1.2 Remote SQL injection/Code Execution Exploit

SQL injection in score.php and quiz_id var in home.php are not proprely verified and can be used to inject query. Arbitary File Upload vulnerable code in back/upload_img.php and admin/upload_img.php near lines 74-76. $upload , $ok_update , $image , $path variables are not sanitized and can be used to upload files. cfgphpquiz/install.php is accessible without authentification, the script is used to save configuration setting in config.inc.php.

Coppermine Photo Gallery v1.2.2b for PHPNUKE (THEME_DIR) Remote File Include Vulnerability

A vulnerability exists in Coppermine Photo Gallery v1.2.2b for PHPNUKE, which allows a remote attacker to include a file from a remote location. This is due to the application not properly sanitizing user-supplied input to the 'THEME_DIR' parameter in the 'themes.php' script. An attacker can exploit this vulnerability to include arbitrary files from remote locations, which can lead to the execution of arbitrary code on the vulnerable system.

Site@School 2.4.02 and below Multiple remote Command Execution Vulnerabilities

Remote File Inclusion: vulnerable code in starnet/modules/sn_allbum/slideshow.php near line 39 - 46 and line 91. $cmsdir is not properly verified, can be used to include files from remote resources which would allow a remote attacker to execute arbitrary command with the privilege of the webserver. Directory Traversal: PoC: http://localhost/starnet/editors/htmlarea/popups/images.php?dir=../../ Arbitary File Upload: PoC: http://localhost/starnet/editors/htmlarea/popups/upload.php

BolinOS v.4.5.5 <= (gBRootPath) Remote File Include Vulnerability

BolinOS v.4.5.5 is vulnerable to a remote file include vulnerability due to a lack of sanitization of user-supplied input to the 'gBRootPath' parameter of the 'gBIndex.php' script. An attacker can exploit this vulnerability by sending a malicious URL to an unsuspecting user. The malicious URL contains a specially crafted string that, when processed by the vulnerable script, will cause arbitrary remote code execution.

Haberx v1.1 (tr) SQL Injection Vulnerability

Haberx v1.1 (tr) is vulnerable to SQL Injection. An attacker can exploit this vulnerability to gain access to the admin credentials by sending a specially crafted HTTP request to the vulnerable application. The vulnerable parameter is 'id' in 'kategorihaberx.asp' page. An attacker can send a malicious payload to the vulnerable parameter to gain access to the admin credentials.

PhotoPost => 4.6 (PP_PATH) Remote File Inclusion Exploit

PhotoPost 4.6 & 4.5 & 4.x.....4.0 is vulnerable to a remote file inclusion vulnerability. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'PP_PATH' parameter of the 'zipndownload.php' script. An attacker can exploit this vulnerability to execute arbitrary PHP code on the vulnerable system. The vulnerable code is located in the 'zipndownload.php' script, which includes the 'require' statement with the 'PP_PATH' parameter.

TeamCal Pro 2.8.001 (app_root) Remote file inclusion Vulnerabilities

A remote file inclusion vulnerability exists in TeamCal Pro 2.8.001, due to insufficient sanitization of user-supplied input to the 'app_root' parameter of the 'footer.html.inc.php' script. An attacker can exploit this vulnerability to include arbitrary remote files, leading to arbitrary remote code execution.

Recent Exploits: