header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

DVD X Player 5.5 Professional (.plf) Universal Buffer Overflow

The DVD X Player 5.5 Professional software is vulnerable to a buffer overflow attack. By crafting a specially formatted .plf file, an attacker can overwrite the program's memory and potentially execute arbitrary code. This exploit takes advantage of a JMP ESP instruction in the EchoDelayProcess.dll module to redirect program execution to the attacker's shellcode. The shellcode used in this exploit launches the Windows calculator application.

WordPress Facebook Promotions plugin <= 1.3.3 SQL Injection Vulnerability

The WordPress Facebook Promotions plugin version 1.3.3 is vulnerable to SQL injection. An attacker can exploit this vulnerability by sending a specially crafted request to the fbActivate.php file, allowing them to execute arbitrary SQL queries.

yahoo! player 1.5 (.m3u) Universal Buffer Overflow (SEH)

This exploit takes advantage of a buffer overflow vulnerability in yahoo! player version 1.5.01.409. By crafting a specially crafted .m3u file, an attacker can trigger a buffer overflow and execute arbitrary code on the target system. The exploit uses a short jump instruction followed by a POP POP RET sequence to overwrite the Structured Exception Handler (SEH) and gain control of the program flow. The exploit payload contains shellcode that spawns a calculator application. This vulnerability has been tested on Windows XP SP3.

WordPress Photoracer Plugin <= 1.0 Multiple XSS & SQLI Vulnerabilities

The WordPress Photoracer Plugin version 1.0 is vulnerable to multiple XSS and SQL Injection vulnerabilities. The vulnerabilities exist in the 'mostvoted.php' and 'mostviewed.php' files. The 'postid' parameter in these files is not properly validated or filtered, allowing an attacker to inject malicious SQL queries. This can lead to unauthorized access, data manipulation, and potentially remote code execution. An example SQL Injection payload is provided in the description.

WordPress Super CAPTCHA plugin <= 2.2.4 SQL Injection Vulnerability

The WordPress Super CAPTCHA plugin version 2.2.4 is vulnerable to SQL injection. An attacker can exploit this vulnerability by sending a specially crafted request to the 'markspam' parameter in the 'admin.php' page of the plugin. This allows the attacker to execute arbitrary SQL queries on the underlying database.

WordPress Js-appointment plugin <= 1.5 SQL Injection Vulnerability

The WordPress Js-appointment plugin version 1.5 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending a crafted request to the 'searchdata.php' file, which does not properly sanitize user-supplied input, resulting in SQL injection. This can lead to unauthorized access to the database and potentially allow the attacker to execute arbitrary SQL queries.

F-Secure Multiple Products ActiveX Remote SEH Overwrite Vulnerability(Heap Spray)

This exploit takes advantage of a SEH (Structured Exception Handling) overwrite vulnerability in multiple F-Secure products. It uses heap spray techniques to exploit the vulnerability.

WordPress MM Duplicate plugin <= 1.2 SQL Injection Vulnerability

The WordPress MM Duplicate plugin version 1.2 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending a crafted request to the 'duplicate' parameter in the 'index.php' file. This can lead to unauthorized access, data manipulation, or data leakage.

Recent Exploits: