header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

CodeBreak (codebreak.php process_method) – Remote File Inclusion Vulnerability

The CodeBreak script is vulnerable to remote file inclusion. The vulnerable code includes a file based on user-controlled input ($_POST['process_method']). An attacker can manipulate the input to include a malicious file from a remote server, leading to arbitrary code execution.

Multiple vulnerabilities in WordPress plugin “NewStatPress”

The plugin "NewStatPress" in WordPress is vulnerable to an authenticated SQL injection vulnerability (CVE-2015-4062) and an authenticated XSS vulnerability (CVE-2015-4063). The SQL injection vulnerability can be exploited by an authenticated user by manipulating the "where1" parameter in the "admin.php" page. The XSS vulnerability can also be exploited by an authenticated user by manipulating the "where1" parameter in the same page.

WordPress Video Gallery 2.8 Unprotected Mail Page

Wordpress Video Gallery 2.8 suffers from Unprotected Mail Page vulnerability which can be exploited for dos, phishing, mailbombing, spam. The 'email' ajax action is callable from any guest visitor (/contus-video-gallery/hdflvvideoshare.php). Any user can send email from /contus-video-gallery/email.php to any recipients. The variables used to send emails are: $to, $from, $url, $subject, $message_content, $title, $referrer, $referrer_host, $pageURL. It assumes that if the provided 'Referrer' field fits the website's URL, then it's okay to send this email.

PunBB <= 1.2.14 Remote Code Execution Exploit

This exploit allows remote attackers to execute arbitrary code on the target system running PunBB version 1.2.14 or earlier. The vulnerability exists due to improper sanitization of user-supplied input in the login.php file. By sending a specially crafted request, an attacker can inject and execute arbitrary PHP code on the target system.

Gran Paradiso Multiple Request Applet Crash

Gran Paradiso is unable to handle a multiple request of non-existent applet so, after some page refresh, crashes or stops to answer. You can try this exploit here www.shinnai.altervista.org/nea.html but, if so, you need a little patience 'cause it's too slow than from local exploitation.

Recent Exploits: