header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Axiom 0.8.6 photo gallery (template.php) Remote File Include Vulnerability

The Axiom 0.8.6 photo gallery (template.php) is vulnerable to remote file inclusion. An attacker can exploit this vulnerability by providing a malicious file as the baseAxiomPath parameter in the template.php file. This allows the attacker to execute arbitrary code on the server.

uniForum <= v4 (wbsearch.aspx) Remote SQL Injection Vulnerability

The uniForum version 4 (wbsearch.aspx) is vulnerable to remote SQL injection. An attacker can exploit this vulnerability by sending a specially crafted request to the wbsearch.aspx page. By manipulating the input parameters, an attacker can inject malicious SQL code into the application's database query, allowing for unauthorized access or manipulation of data.

Remote Information Disclosure in Web Wiz Forums, NewsPad, and Rich Text Editor

The vulnerability exists due to a lack of proper sanitization of user-supplied input. An attacker can exploit this issue by sending a specially crafted request to retrieve arbitrary files in the context of the webserver process. This information can be used to launch further attacks.

@lex Guestbook Remote Command Execution Exploit

This exploit allows an attacker to execute arbitrary commands on the target system through the @lex Guestbook <= 4.0.2 application. By exploiting a local file inclusion vulnerability, the attacker can include a malicious skin file that contains the desired command to be executed. The exploit retrieves the administrator password, logs in as the administrator, adds a skin, and writes the malicious skin file. The command executed in this example is 'whoami', which returns the username 'darkfig'.

Fortinet Fortigate URL Filtering Bypass

An attacker can bypass Fortinet Fortigate's URL filtering functionality by sending specially-crafted HTTP requests terminated by the CRLF character and changing the HTTP version to 1.0 without sending the Host header and fragmenting the GET and POST requests. This allows the attacker to view unauthorized websites and bypass certain security restrictions.

Exploit Of The Apes

This is a practical pwnage exploit for Application (UN)Enhancer, also known as APU. The exploit involves patching certain opcodes in the binary file of the framework to gain unauthorized access and control. The exploit targets the ApplicationEnhancer.framework and ApplicationUnenhancer.framework.

Recent Exploits: