header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PHP-Fusion Mod E-Cart Sql Injection

A SQL injection vulnerability exists in the PHP-Fusion Mod E-Cart, which allows an attacker to extract sensitive information from the database. The vulnerability is caused due to the improper sanitization of user-supplied input in the 'CA' parameter of the 'items.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. This will allow the attacker to extract sensitive information from the database.

PHP-Fusion Mod Members Bewerb Sql Injection

A vulnerability exists in PHP-Fusion Mod Members Bewerb, which allows an attacker to inject arbitrary SQL commands via the 'sortby' parameter in the 'members.php' script. An attacker can exploit this vulnerability to gain access to sensitive information from the database, modify data, or exploit further vulnerabilities in the underlying SQL server software.

WinAmp GEN_MSN Plugin Heap Buffer Overflow

A buffer overflow vulnerability was discovered in the gen_msn plugin, which is a plugin that shows what song a user is currently listening to on their PM in MSN. The vulnerability is located in the .PLS playlist file and can be exploited by sending a maliciously crafted .PLS file with an overly long URL.

LiteServe 2.81 Remote buffer overflow Poc (user)

A buffer overflow vulnerability exists in LiteServe 2.81 which allows a remote attacker to execute arbitrary code by sending a specially crafted USER request with a large number of 'A' characters. This can be exploited to execute arbitrary code by sending a specially crafted USER request with a large number of 'A' characters.

CoolPlayer BUILD 219 ‘PlaylistSkin’ Buffer Overflow Exploit

CoolPlayer is vulnerable to a buffer overflow when processing a specially crafted .pls file. An attacker can exploit this vulnerability to execute arbitrary code in the context of the application. This exploit works on Windows 2000 and Windows XP.

Joomla <= 1.5.8 (xstandard editor) Local Directory Traversal Vulnerability

This vulnerability allows an attacker to traverse the local directory of the vulnerable Joomla version 1.5.8 using the xstandard editor. The attacker can send a specially crafted HTTP request with the X_CMS_LIBRARY_PATH header set to the desired directory and the server will respond with the contents of the directory. This vulnerability can be exploited to gain access to sensitive information stored in the server.

RFI/LFI

playsms 0.9.3 is vulnerable to Remote File Inclusion/Local File Inclusion. The vulnerability is due to the application including files without proper sanitization of user supplied input. This can be exploited to include arbitrary files from remote and local resources by manipulating the 'apps_path[plug]', 'gateway_module', 'apps_path[themes]', 'themes_module' and 'apps_path[libs]' parameters in the 'plugin/gateway/gnokii/init.php', 'plugin/themes/default/init.php' and 'lib/function.php' scripts.

Recent Exploits: