header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MiNBank 1.5.0 Remote Command Execution Exploit

This exploit allows an attacker to execute arbitrary commands on a vulnerable MiNBank 1.5.0 system. The vulnerability exists due to the allow_url_include and register_globals settings being enabled, which allows an attacker to inject malicious code into the vulnerable application. The exploit requires the attacker to have access to a web server to host the malicious code.

Dosya Yukle Scrtipi v1.0 Upload Vulnerability

A vulnerability exists in Dosya Yukle Scrtipi v1.0, which allows an attacker to upload malicious files to the server. An attacker can exploit this vulnerability by sending a malicious file to the server via http://127.0.0.1/dosyayukle/dosyalar/ch99.php. This will allow the attacker to gain access to the server and execute arbitrary code.

Mozilla Firefox 3.6 plenitude String Crash(0day) Exploit

Mozilla Firefox is a popular internet browser. This bug is a typical result when attacker try to write plenitude String in document.write() function. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page.

my little forum contact.php SQL Injection

A SQL injection vulnerability exists in the contact.php page of my little forum, which allows an attacker to execute arbitrary SQL commands via the 'id' parameter. An example exploit is http://site.com/forum/contact.php?id=-11111111'+union+select+1,2,concat(user_name,0x3a,user_pw),4,5+from+forum_userdata+where+user_id=1--+

Uploadify Sample Collection Shell Upload Vulnerability

A vulnerability exists in Uploadify Sample Collection, which allows an attacker to upload a malicious shell to the vulnerable server. The attacker can then execute arbitrary code on the server.

PHP Advanced Transfer Manager v1.10 Shell Upload Vulnerability

A vulnerability in PHP Advanced Transfer Manager v1.10 allows an attacker to upload a malicious shell to the vulnerable server. The vulnerability exists due to insufficient validation of user-supplied input in the 'register.php' and 'index.php' scripts. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing a malicious shell to the vulnerable server. Successful exploitation of this vulnerability can result in arbitrary code execution on the vulnerable server.

Recent Exploits: