header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

CzarNews <= (tpath) Remote File Inclusion Exploit

CzarNews is prone to a remote file-inclusion vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code within the context of the vulnerable application. The attacker can supply a URL to a malicious script in the 'tpath' parameter of the vulnerable script. Successful exploitation requires that 'register_globals' is enabled.

Linux 2.6.x suid_dumpable vulnerability

The suid_dumpable support in Linux kernel 2.6.13 up to versions before 2.6.17.4, and 2.6.16 before 2.6.16.24, allows a local user to cause a denial of service (disk consumption) and POSSIBILY (yeah, sure;) gain privileges via the PR_SET_DUMPABLE argument of the prctl function and a program that causes a core dump file to be created in a directory for which the user does not have permissions (CVE-2006-2451).

Ottoman CMS <= 1.1.3 Remote File Inclusion Exploit

Input passed to the 'default_path' parameter in 'index.php', 'error.php', 'classes/main_class.php', 'format_css.php', 'js.php', and 'rss.php' is not properly sanitized before being used to include files. Vulnerable scripts not properly sanitizing user-supplied input to the 'POST' and 'COOKIE' variables. This can be exploited to execute arbitrary PHP code by including files from local or external resources. Exploitation requires turn ON 'register_globals'.

Webmin / Usermin Arbitrary File Disclosure Vulnerability

This vulnerability allows remote attackers to disclose sensitive information on systems running Webmin or Usermin. The vulnerability is due to a directory traversal flaw in the unauthenticated portion of the Webmin/Usermin server. By sending a specially crafted request, a remote attacker can view arbitrary files on the system with the privileges of the Webmin/Usermin server. This vulnerability affects Webmin versions prior to 1.290 and Usermin versions prior to 1.220.

Sabdrimer PRO (v.2.2.4 ) Remote File Include Vulnerability

Sabdrimer PRO (v.2.2.4 ) is vulnerable to a Remote File Include vulnerability. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'pluginpath[0]' parameter of the 'advanced1.php' script. An attacker can exploit this vulnerability to execute arbitrary PHP code on the vulnerable system by sending a specially crafted HTTP request containing malicious code. The vulnerability is only exploitable if the 'register_globals' PHP option is set to 'On'.

Another Mambo component remote inclusion vulneribility

A remote inclusion vulnerability was found in the Mambo component download.php file. The vulnerability is caused due to the improper validation of user-supplied input in the 'phpbb_root_path' parameter. This can be exploited to include arbitrary files from remote locations by using directory traversal sequences and URL encoded NULL bytes.

Recent Exploits: