header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

plx Autoreminder v3.7 (id) R-Sql Injection

An SQL injection vulnerability in plx Autoreminder v3.7 allows an attacker to execute arbitrary SQL commands via the 'id' parameter in the 'members.php' script. An attacker can use the 'concat()' function to extract the username, version, and database of the application. The attacker can also use the 'union select' statement to extract data from the database.

Destiny Media Player 1.61 (.lst File) Local Stack Overflow Exploit

Destiny Media Player version 1.61 is vulnerable to a local stack-based buffer overflow. The vulnerability is caused due to a boundary error within the processing of .lst files. This can be exploited to cause a stack-based buffer overflow by tricking a user into opening a specially crafted .lst file with an overly long string in the file name field.

PHPMesFilms SQL Injection Vulnerability

A SQL injection vulnerability exists in PHPMesFilms. An attacker can send a specially crafted HTTP request to the vulnerable script and execute arbitrary SQL commands in the back-end database, allowing the attacker to access or modify sensitive data. The vulnerability is due to insufficient sanitization of user-supplied input to the 'id' parameter in the 'index.php' script.

Destiny Media Player (lst file) Buffer overflow PoC

A proof-of-concept exploit for a buffer overflow vulnerability in Destiny Media Player was released by Encrypt3d.M!nd. The exploit creates a malicious .lst file containing a large number of 'A' characters followed by a 4-byte EIP value, followed by more 'A' characters. If the file is opened in Destiny Media Player, the EIP value will be overwritten, potentially allowing arbitrary code execution.

Recent Exploits: