header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PgMarket 2.2.3 (CFG[libdir]) Remote File Inclusion Vulnerabilities

An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. The malicious request contains a URL in the CFG[libdir] parameter that points to a malicious file hosted on a remote server. If the vulnerable server processes the malicious request, the malicious file will be included and executed on the vulnerable server.

CLUB-Nuke [XP] v2.0 LCID 2048 (Turkish Version) SQL Injection Vulnerability

A SQL injection vulnerability exists in CLUB-Nuke [XP] v2.0 LCID 2048 (Turkish Version) which allows an attacker to gain access to the admin panel. The attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This request contains a specially crafted SQL query which can be used to extract sensitive information from the database.

phNNTP v1.3 Remote File Inclusion

phNNTP v1.3 is vulnerable to a Remote File Inclusion vulnerability due to a lack of sanitization of user-supplied input. The vulnerable code is located in the article-raw.php file, which declares the variable file_newsportal. An attacker can exploit this vulnerability by supplying a malicious URL in the file_newsportal parameter. This will allow the attacker to execute arbitrary code on the vulnerable server.

Remote Code Execution Vulnerability in Net::IRC

Net::IRC is a Perl module for creating IRC clients. A vulnerability exists in the way it handles user input, allowing an attacker to execute arbitrary code on the vulnerable system. The exploit code takes advantage of this vulnerability by sending a malicious payload to the victim's IRC client. The payload is a string of hexadecimal characters that, when decoded, contains a malicious Perl script.

docpile:we v0.2.2 (INIT_PATH) Remote File Inclusion Vulnerability

A remote file inclusion vulnerability exists in docpile:we v0.2.2. An attacker can exploit this vulnerability to execute arbitrary code on the vulnerable system by sending a maliciously crafted HTTP request containing a URL in the INIT_PATH parameter. This can be exploited to execute arbitrary PHP code on the vulnerable system.

mtink libXm local root exploit

This exploit uses a setuid binary, mtink, to create a shared library file, lib.so, which is then loaded by the dynamic linker. This shared library contains a function, _init(), which is executed when the library is loaded. This function checks if the real user ID is not 0 and the effective user ID is 0, and if so, it sets the real user ID to 0 and executes a shell. The exploit then creates a file, /etc/ld.so.preload, which contains the path to the shared library, and then executes the setuid binary, which causes the dynamic linker to load the shared library.

TWiki Remote Command Execution Vulnerability

This exploit allows a remote attacker to execute arbitrary commands on a vulnerable TWiki installation. The vulnerability is due to a lack of sanitization of user-supplied input to the 'action' parameter of the 'configure' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP POST request containing malicious commands to the vulnerable server. Successful exploitation of this vulnerability can result in the attacker gaining full control of the vulnerable server.

Recent Exploits: