header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

uigaproxy remote file include

This exploit allows an attacker to include a remote file on the web server. The vulnerability exists due to the use of user-supplied input without proper validation. A remote attacker can exploit this vulnerability to include arbitrary files from a remote Web server and execute arbitrary code on the vulnerable system.

nodesforum_1.033

The vulnerability exists due to insufficient sanitization of user-supplied input in the '_nodesforum_path_from_here_to_nodesforum_folder' and '_nodesforum_code_path' parameters of the 'erase_user_data.php' and 'pre_output.php' scripts. This can be exploited to execute arbitrary PHP code by including a remote file via a URL in the '_nodesforum_path_from_here_to_nodesforum_folder' and '_nodesforum_code_path' parameters.

MunkyScripts Simple Gallery: SQL Injection Vulnerability

MunkyScripts Simple Gallery is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this vulnerability to manipulate SQL queries by injecting arbitrary SQL code. This may allow the attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

Easy~Ftp Server v1.7.0.2 MKD Remote Post-Authentication BoF Exploit

This exploit is for Easy~Ftp Server v1.7.0.2 MKD Remote Post-Authentication BoF vulnerability. It is a buffer overflow exploit which uses Metasploit shellcode (calc.exe) to execute a malicious code. It was discovered by loneferret in 2010 and exploits by 11470.py (PoC) and 11470_x90c.c (Exploit).

Prediction League 0.3.8 CSRF Create Admin User Exploit

This exploit allows an attacker to create an admin user on the Prediction League 0.3.8 application by crafting a malicious form and sending it to the CreateAdminUser.php page. The form contains fields for the admin user name and password, which are then used to create the admin user.

x10 mirco blogging Sql Injection

x10 mirco blogging V121 is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this vulnerability to manipulate SQL queries by injecting arbitrary SQL code. This may allow the attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

Advanced Management For Services Sites =>by pass Creat And Download Buckup Sql Vulnerability

A vulnerability exists in Advanced Management For Services Sites which allows an attacker to bypass the authentication and create and download a backup of the SQL database. The attacker can access the backup.php page without authentication and create and download a backup of the SQL database.

Recent Exploits: