header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Multiple Bugs in MailEnable Enterprise Edition ASP Version <= 2.0

Multiple bugs in MailEnable Enterprise Edition ASP Version <= 2.0 allow an attacker to bypass authentication, gain elevated privileges, perform cross-site scripting, and hijack user sessions.

OpenEMR <= 2.8.1 Remote File Include Vulnerability

OpenEMR version 2.8.1 and prior is vulnerable to a remote file include vulnerability. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. This request contains a URL in the GLOBALS[fileroot] parameter that points to a malicious script hosted on a remote server.

Wikiwig <= V4.1 Remote File Include Vulnerability

A remote file include vulnerability exists in Wikiwig V4.1. An attacker can exploit this vulnerability to include arbitrary files from remote locations by sending a specially crafted request to the vulnerable application. This can lead to arbitrary code execution on the vulnerable system.

ProPublish 2.0 (catid) Remote SQL Injection Vulnerability

A remote SQL injection vulnerability exists in ProPublish 2.0. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to sensitive information such as usernames and passwords stored in the database.

pppBlog <= 0.3.8 system disclosure exploit

pppBlog <= 0.3.8 is vulnerable to system disclosure due to the lack of proper input validation. If register_globals is set to On, an attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. This will allow the attacker to view the content of any file on the server, according to open_basedir restrictions.

Recent Exploits: