header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

actSite v1.991 Beta (base.php) Remote File Inclusion

A remote file inclusion vulnerability exists in actSite v1.991 Beta. The vulnerability is due to improper sanitization of user-supplied input in the $BaseCfg[BaseDir] parameter in lib/base.php. An attacker can exploit this vulnerability to include arbitrary remote files, which could lead to remote code execution.

SAT CFDI 3.3 – SQL Injection

PHP Dashboards is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Wecodex Store Paypal 1.0 – SQL Injection

PHP Dashboards is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

actSite v1.56 (news.php) Local File Inclusion

The actSite v1.56 (news.php) is vulnerable to Local File Inclusion. The vulnerability allows an attacker to include local files from the server by manipulating a POST parameter in the news.php file. By using a specially crafted request, an attacker can include arbitrary files and potentially read sensitive information from the server.

FTPShell Server v6.80 – Local Buffer Overflow (SafeSEH Bypass)

The exploit allows for a local buffer overflow in FTPShell Server v6.80, bypassing SafeSEH protection. By pasting the contents of Evil.txt in the 'Password' field under configure accounts>Change pass, an attacker can execute arbitrary code.

EasyService Billing 1.0 – ‘template_().php’ SQL Injection / Cross-Site Scripting

all of the print and preview pages have the same vulnerabilities. (template_SBilling.php, template_Receipt.php, template_SBillingPerforma.php, template_SBillingQuotation.php) All of them use the same parameters. An attacker can use any of these.

Recent Exploits: