header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Omegaboard v1.0b4 (phpbb_root_path) Remote File Include Exploit

This exploit allows an attacker to include arbitrary remote files in the target system using the 'phpbb_root_path' parameter in the 'functions.php' file of Omegaboard v1.0b4. By manipulating the 'phpbb_root_path' parameter, an attacker can execute malicious code or gain unauthorized access to the target system.

Omnicom Content Platform Directory Traversal Vulnerability

Omnicom Content Platform is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input data. To exploit this issue an attacker may need administrative privileges to the affected application. Exploiting the issue may allow the attacker to obtain sensitive information that could aid in further attacks.

Folder Gallery Remote Code Execution

The vulnerability allows remote attackers to execute arbitrary code on the target system by injecting a malicious shell command through the 'galleryfilesdir' parameter in the template.php file of JV2 Folder Gallery. This can be exploited to gain unauthorized access to the system or perform other malicious activities.

Ping of Death

The Ping of Death is a type of attack where an attacker sends an oversized ping packet to a target system. This oversized packet can cause the target system to crash or become unresponsive, leading to a denial of service condition. The specific command mentioned in the text is an example of how the Ping of Death can be executed.

Dlink DIR-600L Hardware Version AX Firmware Version 1.00 CSRF Vulnerability

This Modem's Web Application suffers from Cross-site request forgery through which attacker can manipulate user data via sending him malicious craft url. The Modems's Application not using any security token to prevent it against CSRF. You can manipulate any userdata. PoC and Exploit to change user password:

McAfee Asset Manager v6.6 multiple vulnerabilities

An unprivileged authenticated user can download arbitrary files with the permissions of the web server using the report download functionality. By generating a report, the user's browser will make a request to /servlet/downloadReport?reportFileName=blah. The user can put in a relative directory traversal attack and download /etc/passwd. An unprivileged authenticated user can initiate a SQL injection attack by creating an audit report and controlling the username specified in the audit report.

Recent Exploits: