header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Kurdish Security Advisory

AnnonceV1.1 is vulnerable to Remote Code Execution. An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable server. The attacker can inject malicious code in the 'page' parameter of the vulnerable script. The malicious code will be executed on the vulnerable server.

dsock <= 1.3 (buf) Remote Buffer Overflow PoC

A buffer overflow in variable 'buf' exists due to insufficient validation of variable 'name' in function tor_resolve line 218 of software at http://www.monkey.org/~dugsong/dsocks/. At a quick glance, this looks like it could indeed be overflowed quite trivially by passing an overlong name to any of the host lookup functions proxied by dsocks. It therefore seems that it could quite easily be triggered remotely by, for example, a web page with an include/iframe using an overlong URL.

MySpeach <= v3.0.2 (my_ms[root]) Remote File Inclusion Exploit

MySpeach version 3.0.2 and all versions below are vulnerable to a Remote File Inclusion vulnerability. The vulnerability exists in the jscript.php file, which allows an attacker to include a remote file by manipulating the my_ms[root] parameter. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing an URL pointing to a malicious file.

in-link <=2.3.4 (adodb-postgres7.inc.php) Remote File Inclusion Exploit

in-link 2.3.4 is vulnerable to a remote file inclusion vulnerability. This vulnerability is due to a failure in the application to properly sanitize user-supplied input to the 'ADODB_DIR' parameter of 'adodb-postgres7.inc.php' script. An attacker can exploit this vulnerability to include arbitrary files from remote hosts and execute arbitrary code on the vulnerable system.

Muratsoft Haber Portal v3.6 (tr) SQL Injection Vulnerability

An attacker can exploit a SQL injection vulnerability in Muratsoft Haber Portal v3.6 (tr) by sending a specially crafted HTTP request to the vulnerable application. By exploiting this vulnerability, an attacker can gain access to the database and execute arbitrary SQL commands.

RFI Vulnerabilities in Flashchat

The vulnerable files are present in case of integration with another script, AEDating. The vulnerable files are aedating4CMS.php, aedatingCMS.php and aedatingCMS2.php. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable server. The malicious URL contains a reference to a file on a remote server which will be included in the application and executed.

Recent Exploits: