header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Shadows Rising RPG (Pre-Alpha) <= 0.0.5b (CONFIG[gameroot]) Remote File Include Vulnerability

Shadows Rising RPG (Pre-Alpha) version 0.0.5b is vulnerable to a remote file include vulnerability. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. This can allow the attacker to execute arbitrary code on the vulnerable server.

SimpleBlog 2.0 <= "comments.asp" SQL Injection Exploit

A vulnerability in SimpleBlog 2.0 <= "comments.asp" allows an attacker to inject arbitrary SQL commands. This can be exploited to manipulate SQL queries by e.g. injecting additional statements. This can be used to bypass authentication or disclose sensitive information.

SportsPHool <= 1.0 (mainnav) Remote File Include Vulnerability

SportsPHool version 1.0 is vulnerable to a remote file include vulnerability. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. This will allow the attacker to include a remote file containing arbitrary code, which will be executed on the vulnerable server.

NES Game & NES System <= c108122 (phphtmllib) Remote File Include Vulnerability

NES Game & NES System version c108122 is vulnerable to a remote file include vulnerability. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable parameter 'phphtmllib' in multiple scripts. This can allow the attacker to execute arbitrary code on the vulnerable system.

mambo com_babackup (1.1) Component (mosConfig_absolute_path) Remote File Inclusion Vulnerabilities

The vulnerability exists due to insufficient sanitization of user-supplied input passed to the 'mosConfig_absolute_path' parameter of 'Tar.php' script. A remote attacker can include arbitrary files from remote locations and execute arbitrary code on the vulnerable system.

ZZ:FlashChat <= V3.1 (adminlog) Remote File Inclusion Exploit

A vulnerability exists in ZZ:FlashChat V3.1, due to the improper validation of user-supplied input in the 'adminlog' parameter of the 'chat/inc/func.add_data.php' script. An attacker can exploit this vulnerability to execute arbitrary PHP code on the vulnerable system by supplying a malicious URL in the 'adminlog' parameter.

mambo com_lurm_constructor Component (mosConfig_absolute_path) Remote File Inclusion Vulnerabilities

An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing a malicious URL in the 'lm_absolute_path' parameter. This can allow the attacker to execute arbitrary code on the vulnerable system.

Fantastic News <= v2.1.3 (CONFIG[script_path]) Remote File Inclusion Exploit

Fantastic News versions 2.1.2 and 2.1.3 are vulnerable to a Remote File Inclusion vulnerability due to a lack of proper sanitization of user-supplied input to the CONFIG[script_path] parameter in the news.php script. An attacker can exploit this vulnerability by sending a malicious URL in the CONFIG[script_path] parameter, which will be executed on the vulnerable server.

Tutti Nova <= v1.6 (TNLIB_DIR) Remote File Inclusion Exploit

A vulnerability exists in Tutti Nova <= v1.6 due to improper validation of user-supplied input in the TNLIB_DIR parameter of the class.novaEdit.mysql.php script. An attacker can exploit this vulnerability to execute arbitrary PHP code on the vulnerable system by supplying a malicious URL in the TNLIB_DIR parameter.

Cce-interact <= 2.2.0 (CONFIG[BASE_PATH]) Remote File Include Vulnerability

Cce-interact version 2.2.0 and below is vulnerable to a remote file include vulnerability. This vulnerability exists due to insufficient sanitization of user-supplied input in the 'CONFIG[BASE_PATH]' parameter of the 'admin/autoprompter.php' script. An attacker can exploit this vulnerability to execute arbitrary PHP code on the vulnerable system.

Recent Exploits: