header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

netPanzer 0.8 rev 952 (frameNum) Server Terminiation Exploit

netPanzer 0.8 rev 952 is prone to a buffer overflow vulnerability when handling a specially crafted packet. This can be exploited to cause a stack-based buffer overflow by sending a packet with an overly long 'frameNum' value to the server. This may allow remote attackers to execute arbitrary code on the vulnerable system.

PunkBuster Buffer Overflow Vulnerability

A buffer overflow vulnerability exists in PunkBuster for servers, versions minor than v1.229. The authentication mechanism is handled through a parameter called webkey followed by the password and sent by the client using the POST method or directly in the URL. A webkey longer than 1024 byte will cause a buffer overflow in the function which handles the authentication.

phpCommunityCalendar 4.0.3 Multiple Vulnerabilites

The phpCommunityCalendar 4.0.3 is vulnerable to XSS and SQL Injections. An attacker can inject malicious scripts into the LoName parameter of the week.php, month.php and event.php files. An attacker can also inject malicious SQL queries into the query parameter of the month.php, day.php, event.php, delCalendar.php, delAdmin.php, delAddress.php and delCategory.php files.

Docebo 3.0.3/DoceboCMS,DoceboKms,DoceboLms,DoceboCore,DoceboScs – Remote File Include Vulnerabilities

Docebo 3.0.3/DoceboCMS,DoceboKms,DoceboLms,DoceboCore,DoceboScs are vulnerable to a remote file include vulnerability. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. This can allow the attacker to execute arbitrary code on the server.

Fusion News v.1.0 Remote File Inclusion Exploit

Fusion News v.1.0 is vulnerable to a remote file inclusion vulnerability due to the use of the register_globals PHP directive. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server, which will include the malicious code in the 'fil_config' parameter. This will allow the attacker to execute arbitrary code on the vulnerable server.

XOOPS <= 2.0.13.2 'xoopsOption[nocommon]' exploit

XOOPS is vulnerable to a remote code execution vulnerability due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. This will allow the attacker to execute arbitrary code on the vulnerable server.

Woltlab Burning Board 2.3.4 <= "links.php" SQL Injection Exploit

This exploit allows an attacker to inject malicious SQL queries into the vulnerable Woltlab Burning Board 2.3.4 web application. The vulnerable parameter is the "cat" parameter in the "links.php" file. By exploiting this vulnerability, an attacker can gain access to the database and extract sensitive information such as usernames and passwords.

CaLogic Calendars V1.2.2 – Remote File Include

CaLogic Calendars version 1.2.2 is vulnerable to a remote file include vulnerability. This vulnerability allows an attacker to include a remote file, usually through a malicious URL, containing arbitrary code which is then executed on the vulnerable server. This vulnerability is due to the application not properly sanitizing user-supplied input to the 'GLOBALS[CLPath]' parameter in the 'reconfig.php' and 'srxclr.php' scripts. An attacker can exploit this vulnerability by crafting a malicious URL containing a malicious script and then convincing an unsuspecting user to click on the link. Successful exploitation can result in arbitrary code execution on the vulnerable server.

Recent Exploits: