header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

INVISION POWER BOARD 2.1.5 Remote Command Execution

This exploit allows an attacker to execute arbitrary commands on a vulnerable system running INVISION POWER BOARD 2.1.5. The attacker must have permission to post a comment in order to exploit this vulnerability. The exploit works by sending a specially crafted POST request to the vulnerable system, which then executes the malicious code.

Advanced GuestBook for phpBB <= 2.4.0 Remote File Inclusion Exploit

Advanced GuestBook for phpBB <= 2.4.0 is vulnerable to a remote file inclusion vulnerability. This vulnerability allows an attacker to execute arbitrary code on the vulnerable server. The vulnerability is due to the 'phpbb_root_path' parameter in the 'addentry.php' script not being properly sanitized before being used in a 'require_once' function call. This can be exploited to include arbitrary files from remote hosts and execute arbitrary PHP code.

Advanced GuestBook for phpBB <= 2.4.0 Remote File Inclusion

Advanced GuestBook for phpBB version 2.4.0 and prior is vulnerable to a remote file inclusion vulnerability. This vulnerability allows an attacker to include a remote file, usually containing malicious code, on the vulnerable website. The vulnerable code is located in the addentry.php file.

CSRF and XSS in phpGraphy

The vulnerability exists due to failure in the "index.php" script to properly verify the source of HTTP request. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data. Attacker can use browser to exploit this vulnerability. The vulnerability exists due to failure in the "/themes/default/header.inc.php" script to properly sanitize user-supplied input in "theme_dir" variable then register_globals on. Successful exloitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.

PHP Phar Extension Heap Overflow

An integer overflow vulnerability leading to a heap overflow in the file ..php-5.3.6extphartar.c. If entry.filename_len(which attacker can control) equal 0xffffffff, pemalloc() will allocate zero length buffer. Then php_stream_read() get as a length parameter 0xffffffff value. Because php_stream_read () checks that the passed length does not exceed the amount of data available, the buffer overflow sizes are available from the data stream.

Invision Power Board 2.* commands execution exploit

This exploit allows an attacker to execute arbitrary commands on a vulnerable Invision Power Board 2.* installation. The vulnerable versions are <= 2.1.5 and the exploit has been tested on 2.1.4 and 2.0.2. The exploit uses a POST request to the index.php page with the login credentials and a session ID to authenticate and then executes the command.

Recent Exploits: