header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

RsGallery2 for Joomla

A vulnerability exists in RsGallery2 for Joomla, which allows a remote attacker to execute arbitrary code. This is due to the application failing to properly sanitize user-supplied input to the 'mosConfig_absolute_path' parameter in the 'rsgallery.html.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing an arbitrary file path to the vulnerable script. This will cause the application to include and execute the arbitrary file.

Scout Portal Toolkit 1.4.0 Remote SQL injection Exploit

Scout Portal Toolkit version 1.4.0 is vulnerable to a remote SQL injection vulnerability. This vulnerability allows an attacker to gain access to the admin credentials of the application. The exploit works regardless of the magic_quotes_gpc setting. The vulnerable file is SPT--ForumTopics.php and the PoC is http://host/path/SPT--ForumTopics.php?forumid=[SQL].

Dreamaccount Remote Command Execution Exploit

DreamAccount V3.1 is vulnerable to a remote command execution vulnerability due to a lack of proper input validation. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server with the malicious payload in the ‘path’ parameter. This will allow the attacker to execute arbitrary commands on the vulnerable server.

DeluxeBB <= 1.07 Create Admin Exploit

DeluxeBB version 1.07 and prior are vulnerable to an authentication bypass vulnerability. An attacker can exploit this vulnerability to gain administrative access to the application. The vulnerability exists due to insufficient validation of user-supplied input in the 'cp.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable script. This will allow the attacker to gain administrative access to the application.

Recent Exploits: