header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Move Networks Quantum Streaming Player Control UploadLogs() Buffer Overflow Exploit

This exploit is for Move Networks Quantum Streaming Player Control UploadLogs() Buffer Overflow vulnerability. It was written by e.b. and tested on Windows XP SP2(fully patched) English, IE6, qsp2ie07074039.dll version 7.7.4.39(digitally signed Tuesday, September 18, 2007 7:10:35PM). It was also thanks to h.d.m. and the Metasploit crew.

DBHcms <= 1.1.4 Remote File Inclusion exploit

This exploit allows an attacker to execute arbitrary code on the vulnerable server by including a malicious file. The exploit is hard to execute through a browser, but possible. The exploit requires the attacker to send a POST request to the vulnerable server, containing the malicious file URL in the 'extmanager_install' parameter.

MiniNuke v2.1 forum SQL Injection

MiniNuke v2.1 forum is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable application. This can be done by sending a specially crafted URL to the vulnerable application. The URL contains malicious SQL query which can be used to extract sensitive information from the database.

PHP-Nuke (Kose_Yazilari) SQL Injection Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'artid' parameter to 'modules.php' script. A remote attacker can execute arbitrary SQL commands in application's database, cause denial of service, access or modify data, exploit latent vulnerabilities in the underlying database and gain access to the administrative panel.

MyServer 0.8.11 “204 No Content” error Remote Denial of Service

MyServer 0.8.11 is vulnerable to a remote denial of service attack. By sending a specially crafted DELETE request with an overly long string, a remote attacker can cause the service to crash. This vulnerability can be exploited using other HTTP methods such as GET, OPTIONS, etc.

Portail Web Php <= 2.5.1.1 Multiple Remote/Local File Inclusion Vulnerabilities

Portail Web Php version 2.5.1.1 is vulnerable to multiple remote and local file inclusion vulnerabilities. The remote file inclusion vulnerability can be exploited by sending a malicious URL to the vulnerable parameter 'site_path' in the 'template/Vert/index.php', 'template/Noir/index.php' and 'template/Bleu/index.php' scripts. The local file inclusion vulnerability can be exploited by sending a malicious URL to the vulnerable parameter 'page' in the 'PwP2.5.1.1/' script.

Recent Exploits: