header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

VerliAdmin <= 0.3 Remote Command Execution Exploit

This exploit allows an attacker to execute arbitrary commands on a vulnerable VerliAdmin version 0.3. The vulnerability exists in the 'language.php' file, where the 'lang' cookie is not properly sanitized before being used in an 'Include' statement. By manipulating the 'lang' cookie, an attacker can include arbitrary files and execute commands on the server.

DB Hub Remote Denial-of-Service Vulnerability

A remote denial-of-service vulnerability affects the DB Hub application because of a memory-corruption flaw when the application attempts to process specially crafted network traffic. An attacker may exploit this issue to crash affected applications, denying service to legitimate users.

Quick.Cms.Lite <= 0.3 Remote Code Execution Exploit

Quick.Cms.Lite is vulnerable to remote code execution due to the use of register_globals=On. An attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable application. This will allow the attacker to execute arbitrary code on the server.

tinyBB <= 0.3 Multiple Remote Vulnerabilities

This exploits works on tinyBB <= 0.3. It includes a Remote File Include vulnerability, a Local File Include vulnerability, and a SQL injection vulnerability. The Remote File Include vulnerability allows an attacker to include a remote file on the vulnerable server. The Local File Include vulnerability allows an attacker to include a local file on the vulnerable server. The SQL injection vulnerability allows an attacker to inject malicious SQL code into the vulnerable server.

WordPress oQey Headers plugin <= 0.3 SQL Injection Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input in the 'img_header_id' parameter of the 'oqey_settings.php' script. A remote attacker can send a specially crafted HTTP request to the vulnerable script and execute arbitrary SQL commands in the application's database, cause denial of service or access sensitive data.

Recent Exploits: