header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WordPress oQey Gallery plugin <= 0.4.8 SQL Injection Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input in 'gal_id' parameter of 'getimages.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database. Successful exploitation of this vulnerability may allow an attacker to gain access to sensitive information from the database.

WordPress Zotpress plugin <= 4.4 SQL Injection Vulnerability

A SQL injection vulnerability exists in WordPress Zotpress plugin version 4.4 and earlier. The vulnerability is due to insufficient sanitization of user-supplied input in the 'api_user_id', 'account_type', and 'displayImages' parameters of the 'zotpress.rss.php' script. An attacker can exploit this vulnerability to inject and execute arbitrary SQL commands in the application's back-end database.

Openads-2.0.11 Remote File inclusion Vulnerability

Openads-2.0.11 is vulnerable to Remote File Inclusion (RFI) vulnerability. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable parameter 'row' in 'lib-view-main.inc.php' file. This malicious URL can be used to execute arbitrary code on the vulnerable server.

WordPress Facebook Opengraph Meta Plugin plugin <= 1.0 SQL Injection Vulnerability

A SQL injection vulnerability exists in the WordPress Facebook Opengraph Meta Plugin plugin version 1.0. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. This can allow the attacker to execute arbitrary SQL commands on the underlying database.

BroadWin WebAccess Client

The OcxSpool function is affected by a format string vulnerability caused by the usage of the Msg string provided by the attacker directly with vsprintf() without the required format argument. WriteTextData and CloseFile allow to corrupt arbitrary zones of the memory through a fully controllable stream identifier in fclose() and fwrite().

DVD X Player 5.5 .plf PlayList Buffer Overflow

This module exploits a stack-based buffer overflow on DVD X Player 5.5 Pro and Standard. By supplying a long string of data in a plf file (playlist), the MediaPlayerCtrl.dll component will attempt to extract a filename out of the string, and then copy it on the stack without any proper bounds checking, which casues a buffer overflow, and results arbitrary code execution under the context of the user.

Error with overflows and perf::perf_count_sw_cpu_clock

This test will crash Linux 3.0.0 by using a buffer overflow vulnerability. The exploit is triggered by a call to the perf_event_open() system call with a PERF_COUNT_SW_CPU_CLOCK configuration. This causes a SIGIO signal to be sent to the process, which is then handled by the our_handler() function. This function increments the total variable, which can be used to cause a crash.

WordPress SearchAutocomplete plugin <= 1.0.8 SQL Injection Vulnerability

The vulnerability exists due to insufficient filtration of user-supplied data passed via the 'term' parameter to '/wp-content/plugins/search-autocomplete/includes/tags.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database, cause disclosure of sensitive information, modify data and compromise vulnerable application.

Recent Exploits: