header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Squirrelcart <= 2.2.0 Remote File Inclusion

A remote file inclusion vulnerability exists in Squirrelcart version 2.2.0 and earlier. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing a malicious URL to the vulnerable application. This can allow the attacker to execute arbitrary code on the vulnerable system.

TR Newsportal – Remote File Include

TR Newsportal is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.

Blue Coat Reporter Unauthenticated Directory Traversal

The vulnerability is a Directory Traversal in the Reporter web interface. The vulnerability allows an unauthenticated attacker to access to any file in the system, including the Reporter configuration file (reporter.cfg) which contains the database credentials. The vulnerability is triggered when an attacker sends a specially crafted HTTP request to the Reporter web interface. The vulnerable parameter is the "file" parameter in the "getfile.php" script.

Sugar Suite Open Source <= 4.2 "OptimisticLock!" arbitrary remote inclusion exploit

Sugar Suite Open Source version 4.2 and below is vulnerable to an arbitrary remote code inclusion vulnerability. This vulnerability is due to the lack of proper validation of user-supplied input in the 'class' and 'id' parameters of the 'LockResolve' action of the 'OptimisticLock' module. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow the attacker to execute arbitrary code on the vulnerable system.

Raydium <= SVN 309 Multiple Remote Vulnerabilities Exploit

Raydium is prone to multiple remote vulnerabilities, including a buffer-overflow vulnerability, a format-string vulnerability, and a denial-of-service vulnerability. An attacker can exploit these issues to execute arbitrary code in the context of the affected application, to cause a denial-of-service condition, or to gain sensitive information.

Outgun <= 1.0.3 bot 2 Multiple Remote Vulnerabilities Exploit

Outgun is a free, open source, fast-paced, team-based, multiplayer game. Outgun <= 1.0.3 bot 2 contains multiple remote vulnerabilities. A remote attacker can exploit these vulnerabilities to execute arbitrary code on the vulnerable system.

PhpBB <= v2.0.20 "Admin/Restore Database/default_lang remote commands execution

If an attacker has admin session id, they can enable avatar uploads and store an arbitrary path for "default_lang" inside phpbb_config database table using the "Database Restore" feature. This allows the attacker to upload a malicious avatar with php code as EXIF metadata content and submit a query to the database. The $board_config['default_lang'] variable is not sanitized before being used to include files, so the malicious avatar can be reached and the code inside of it can be executed.

Recent Exploits: