header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

HPE v0.6.1 Remote File Inclusion Vulnerability

HPE versions 0.6.1, 0.6.5 and 0.7.0 are vulnerable to Remote File Inclusion (RFI) attacks. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable application. This URL contains a malicious file which is then included in the application. This can lead to arbitrary code execution on the server.

Empire CMS <=3.7 (checklevel.php) Remote File Include Vulnerability

Empire CMS version 3.7 and prior is vulnerable to a remote file include vulnerability. This vulnerability is due to a failure in the application to properly sanitize user-supplied input to the 'check_path' parameter of the 'checklevel.php' script. An attacker can exploit this vulnerability to execute arbitrary PHP code on the vulnerable system. The attacker can supply a URL in the 'check_path' parameter to execute arbitrary PHP code on the vulnerable system.

Exploit for Apache mod_rewrite off-by-one

This exploit is for Apache mod_rewrite off-by-one vulnerability discovered by Mark Dowd. It is a shellcode based on Taeho Oh bindshell on port 30464 and modified for avoiding apache url-escape. The shellcode address in heap memory on apache 1.3.34 (debian sarge) is at 0x0834ae77 for any other version/system.

Content management module for PHProjekt v0.6.1 Remote File Inclusion Vulnerability

This vulnerability allows an attacker to include a remote file on the vulnerable server. This can be exploited to execute arbitrary PHP code on the vulnerable server by including a malicious file from a remote location.

SimpleBlog 2.0 SQL Injection Exploit

SimpleBlog 2.0 is vulnerable to a SQL injection vulnerability. An attacker can exploit this vulnerability to gain access to the admin panel of the application. The vulnerability is due to the application not properly sanitizing user-supplied input before using it in an SQL query. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This will allow the attacker to gain access to the admin panel of the application.

Simple Machines Forum <= 1.1 rc2 "lngfile" Zend_Hash_Del_Key_Or_Index/arbitrary local inclusion exploit (Win boxes)

This exploit allows an attacker to include a local file on the vulnerable server. It works against Windows boxes regardless of php.ini settings against PHP < 4.3.3, PHP 5 < 5.1.4. The attacker needs to register an account on the vulnerable server and then send a crafted HTTP request to the server to include the local file.

Recent Exploits: