header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

DC-Portal 6.1.x, Remote command execution

Error occured in lib.php, line 4/7: include ("$root/library/lib_nav.php"); include ("$root/library/lib_mods.php"); include ("$root/library/lib_admin.php"); include ("$root/library/lib_3rd.php"); variable $root not sanitized (declare). Proof of concept: http://example/[dp_path]/library/lib.php?root=[cmd_url]

Content-Builder (CMS) 0.7.5, Remote command execution

Multiple vulnerabilities exist in Content-Builder (CMS) 0.7.5, which can be exploited by malicious people to conduct unauthorized activities. The vulnerabilities are caused due to the use of user-supplied input in several scripts without proper sanitization. This can be exploited to execute arbitrary commands by e.g. passing malicious parameters to the vulnerable scripts. Successful exploitation requires that the attacker can access the vulnerable scripts directly.

WebprojectDB (INCDIR) <= v.0.1.3 Remote File Include Vulnerability

In nav.php of WebprojectDB, the include statement is vulnerable to remote file inclusion. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable application. The malicious URL contains the path of the malicious file which is to be included in the application. This malicious file can be used to execute arbitrary code on the vulnerable system.

phpOnDirectory (CONST_INCLUDE_ROOT) <= v.1.0 Remote File Include Vulnerability

phpOnDirectory is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code in the context of the webserver process. Successful exploits will result in the complete compromise of the affected application.

aePartner (dir[data]) <= v.0.8.3 Remote File Include Vulnerability

aePartner is vulnerable to a remote file include vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing a malicious file path in the 'dir[data]' parameter. This will allow the attacker to execute arbitrary code on the vulnerable system.

Recent Exploits: