header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Docebo LMS 2.05

Docebo LMS 2.05 is vulnerable to Remote File Inclusion. The vulnerable files are doceboLMS205/modules/credits/business.php, doceboLMS205/modules/credits/credits.php and doceboLMS205/modules/credits/help.php. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable application. The malicious URL contains a malicious script which will be executed on the vulnerable application.

Windows 2008 SP2 RC2 & Windows 7 Pro SP1 Explorer Go Byebye :P

This exploit is a directory traversal vulnerability in Windows 2008 SP2 RC2 and Windows 7 Pro SP1. It allows an attacker to delete files and directories outside of the intended directory. The exploit is triggered by creating a directory named 'trigger_alt' and a subdirectory named '....' in the root directory. Then, the attacker can use the SHFileOperation function to delete the directory and its contents.

WMP11 Remote Null Pointer

This exploit is a buffer overflow vulnerability in Windows Media Player 11.0.5721.5262 on Windows XP SP3 x86 and Windows 7 SP2 x64. It allows an attacker to execute arbitrary code by sending a specially crafted packet to the Windows Media Player service.

V-Webmail 1.6.4

V-webmail is a powerful PHP based webmail application with an abundance of features, including many innovative ideas for web applications. The vulnerability exists in the v-webmail/includes/pear/*/*.php and v-webmail/includes/mailaccess/pop3.php files, which allow an attacker to include a remote file by manipulating the CONFIG[pear_dir] parameter. Versions 1.3, 1.5 and 1.6.4 are vulnerable.

Socketmail <= 2.2.6 - Remote File Include Vulnerability

Socketmail is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code in the context of the webserver process. This may facilitate unauthorized access or privilege escalation.

Content Management System – Remote File Include Vulnerabilities

A remote file include vulnerability exists in the 404.php file of the open-medium Content Management System. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server, containing a malicious file in the REDSYS[MYPATH][TEMPLATES] parameter. This can allow the attacker to execute arbitrary code on the vulnerable server.

Recent Exploits: