header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

CoolPlayer 2.19 (Skin File) Local Buffer Overflow Exploit

CoolPlayer 2.19 is vulnerable to a local buffer overflow vulnerability. This vulnerability is caused by a lack of proper bounds checking when handling skin files. An attacker can exploit this vulnerability by crafting a malicious skin file and convincing a user to open it. This will allow the attacker to execute arbitrary code on the vulnerable system.

Emefa Guestbook V 3.0 Remote Database Disclosure Vulnerability

A vulnerability in Emefa Guestbook V 3.0 allows an attacker to remotely access the database of the application. This can be done by accessing the guestbook.mdb file located in the root directory of the application. This vulnerability can be exploited by an attacker to gain access to sensitive information stored in the database.

PowerStrip Local Privilege Escalation Exploit

This exploit is related to the PowerStrip NT kernel-mode driver - pstrip.sys <= 5.0.1.1. It allows a local user to gain elevated privileges on the system. The exploit is based on the common flaws in drivers and was discovered by Ruben Santamarta.

chicomas <=2.0.4 Multiple Vulnerabilities

ChiCoMaS is free web based Content Management System based on PHP & MySQL with Full featured WYSIWYG TinyMCE editor, File management with QuiXplorer, User and group administration to manage access permissions & Backup/Restore with integrated MySqlBackupPro. Database Information Disclosure can be exploited by accessing http://[URL]/chicomas/config.inc. The Latest generated Database backups can be accessed by http://[URL]/chicomas/backup. Cross Site Scripting (XSS) can be exploited by Reflected XSS attack in 'index.php' in 'q' parameter by accessing http://[URL]/chicomas/index.php?q='<script>alert(/www.BugReport.ir/.source)</script>'

ReVou Twitter Clone Arbitrary File Upload Vulnerability

A vulnerability exists in ReVou Twitter Clone which allows an attacker to upload arbitrary files on the server. An attacker can create a file called name.php and fill it with malicious code and upload it to the server. This can be done by going to the “My photo” page and selecting the shell and uploading it.

Userlocator 3.0 Exploit

This exploit is used to gain access to the password of a user in the Userlocator 3.0 application. It uses a SQL injection vulnerability to gain access to the password of a user by using the user id. It uses the LWP::Simple module to send requests to the application and then uses the ASCII code of the characters to get the password of the user.

Constructr CMS

Constructr CMS versions <= 3.02.5 have a vulnerability that allows attackers to traverse directories, disclose source code, and create arbitrary files. This is possible due to the magic_quotes_gpc and register_globals settings being set to Off and On respectively. Additionally, attackers can gain access to the database information by accessing the config/config.inc.php file. Furthermore, attackers can gain access to user information by using a SQL injection attack on the show_page parameter. The user's password is stored in plaintext in the hash field.

Recent Exploits: