header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Chasys Media Player 1.1 (.pls) Stack Overflow Exploit

This exploit is for Chasys Media Player version 1.1. It takes advantage of a stack overflow vulnerability in the program's handling of .pls files. By creating a specially crafted .pls file, an attacker can execute arbitrary code on the target system. The exploit includes a shellcode payload that launches a bind shell on port 666.

PPLive <= 1.9.21 uri handlers "/LoadModule" remote argument injection

The "synacast://", "Play://" ,"pplsv://" and "ppvod://" URI handlers in PPLive <= 1.9.21 do not verify certain parts of the URI before evaluating command line parameters. This can be exploited against Internet Explorer to e.g. load a dll from a remote UNC path via the "/LoadModule" parameter.

JDKChat v1.5 Remote Integer Overflow PoC

The JDKChat v1.5 server is vulnerable to a remote integer overflow. This vulnerability allows an attacker to execute arbitrary code on the server. By sending a specially crafted command, an attacker can cause the server to crash or execute arbitrary code.

PhpMySport v. 1.4 Multiple Remote Vulnerabilities (XSSSQL)

The vulnerability exists in the search_member page of the PhpMySport script, allowing attackers to execute SQL injection and cross-site scripting (XSS) attacks. An attacker can manipulate the search_member form to retrieve sensitive information such as encrypted passwords, names, emails, and other user details through SQL injection. Additionally, the script is vulnerable to XSS attacks on various pages, including the competition and member_list pages. An attacker can inject malicious JavaScript code to exploit this vulnerability.

Recent Exploits: