header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MyBulletinBoard (MyBB) <= 1.1.3 Create An Admin Exploit

This exploit allows an attacker to gain admin access to a MyBulletinBoard (MyBB) version 1.1.3 or lower. The exploit uses a POST request to the member.php page with the username and password of the user. If the login is successful, the exploit then sends a GET request to the usercp.php page with the additionalgroups parameter set to 4. This will give the user admin access. Finally, the exploit sends a GET request to the index.php page to verify that the user has admin access.

PhpMySms <= V2.0 (ROOT_PATH) Remote File Include Vulnerability

A remote file include vulnerability exists in PhpMySms <= V2.0, due to the application including files based on user input without proper validation. An attacker can exploit this vulnerability to include arbitrary files from remote locations, which can lead to the execution of arbitrary code on the vulnerable system.

BitchX (epic) =<1.1-final | do_hook() Boundary Check Error Remote DoS

A remote denial of service vulnerability exists in BitchX (epic) version 1.1-final and earlier due to a boundary check error in the do_hook() function. An attacker can exploit this vulnerability by sending a specially crafted packet with a large value for the 'which' parameter to the server, resulting in a crash. This vulnerability can be triggered remotely.

W-Agora <= 4.2.0 (inc_dir) Remote File Inclusion Exploit

This exploit allows an attacker to execute arbitrary code on the vulnerable server by including a file from a remote web server through a vulnerable web application. The vulnerability exists due to insufficient sanitization of user-supplied input passed to the 'inc_dir' parameter in 'forgot_password.php' script.

Harpia CMS <= 1.0.5 Remote File Include Vulnerabilities

Multiple Remote File Include vulnerabilities have been discovered in Harpia CMS version 1.0.5. An attacker can exploit these vulnerabilities by sending a maliciously crafted HTTP request to the vulnerable application. This can allow the attacker to execute arbitrary code on the vulnerable system.

Ralf Image Gallery <= 0.7.4 - Multiple Remote File Include and directory traversal Vulnerabilities

Ralf Image Gallery (RIG) is prone to multiple remote file include and directory traversal vulnerabilities because it fails to sufficiently sanitize user-supplied input. An attacker can exploit these issues to execute arbitrary remote PHP code in the context of the webserver process, or to view sensitive files on the affected computer.

Recent Exploits: