header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Horde help module remote execution

Horde help module remote execution is a vulnerability that allows an attacker to execute arbitrary code on a vulnerable system. The vulnerability is caused by a lack of input validation in the Horde help module, which allows an attacker to inject malicious code into the module. The code is then executed on the vulnerable system, allowing the attacker to gain access to the system and potentially execute malicious code.

PHPMyChat 0.15.0dev “SYS enter” remote cmmnds xctn 0day (again)

A vulnerability exists in PHPMyChat 0.15.0dev which allows an attacker to execute arbitrary commands on the vulnerable system. This is due to the application not properly sanitizing user-supplied input to the 'SYS' parameter when passed to the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious commands to the vulnerable server. This vulnerability is only exploitable when 'magic_quotes_gpc' is set to 'Off'.

PHPMyChat <= 0.14.5 "SYS enter" remote cmmnds xctn 0day

A vulnerability exists in PHPMyChat <= 0.14.5 which allows an attacker to execute arbitrary commands remotely. This is due to the lack of sanitization of the 'T' argument in the chat/messagesL.php3 file which is used in an INSERT query. The vulnerable code is located near lines 56-60 and the eval() function is used near line 197.

INDEXU <= 5.0.1 base_path Remote File Inclusion Exploit

INDEXU <= 5.0.1 is vulnerable to a remote file inclusion vulnerability. This vulnerability allows an attacker to include a remote file, usually through a malicious URL, and execute it on the vulnerable server. This exploit allows an attacker to execute arbitrary code on the vulnerable server.

AngelineCMS 0.8.1 installpath Remote Code Execution Exploit

This exploit allows an attacker to execute arbitrary code on the vulnerable server by exploiting a vulnerability in AngelineCMS 0.8.1. The vulnerability exists due to insufficient sanitization of user-supplied input to the 'installPath' parameter in the 'loadkernel.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing an arbitrary command which will be executed on the vulnerable server.

Total Commander unacev2.dll Buffer Overflow PoC Exploit

This exploit is a proof-of-concept exploit for a buffer overflow vulnerability in Total Commander's unacev2.dll. When the file is created, the user can open the archive in Total Commander and then unpack it. The exploit is written in C and contains an array of malicious data that is written to a file called evil.ace.

VWar <= 1.5.0 R12 Remote File Inclusion Exploit

VWar <= 1.5.0 R12 is vulnerable to a Remote File Inclusion vulnerability which allows an attacker to execute arbitrary code on the vulnerable server. This exploit allows an attacker to execute arbitrary code on the vulnerable server by sending a maliciously crafted HTTP request to the vulnerable server. The maliciously crafted HTTP request contains a URL pointing to a malicious file which is then included and executed on the vulnerable server.

PHPNuke-Clan 3.0.1 Remote File Inclusion Exploit

PHPNuke-Clan 3.0.1 is vulnerable to a Remote File Inclusion vulnerability which allows an attacker to execute arbitrary code on the vulnerable server. This vulnerability is due to the 'modules/vWar_Account/includes/functions_common.php' script not properly sanitizing user input supplied to the 'vwar_root2' parameter. An attacker can exploit this issue to execute arbitrary PHP code on the affected computer with the privileges of the webserver process.

Recent Exploits: