header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Memberkit 1.0 Remote File Upload

After registered and logged in, a user can upload any type of file in 'My Picture Album' where a picture would usually be uploaded. For example, if the file 'shell.php' was uploaded to somesite.com, its location would likely be http://somesite.com/uploads/pictures/pictures/[user]/[picture number]_shell.php. The location of the file can also easily be found by using your browser's 'view image' function where the image would appear regularly.

Elecard MPEG Player Buffer Overflow POC

A buffer overflow vulnerability exists in Elecard MPEG Player 5.5 build 15884.081218. The vulnerability is caused due to a boundary error when handling .M3U files. This can be exploited to cause a stack-based buffer overflow by tricking a user into opening a specially crafted .M3U file. Successful exploitation may allow execution of arbitrary code.

PHPFootball <= 1.6 (filter.php) Remote Hash Disclosure Exploit

This exploit allows a remote attacker to disclose the hashes of the passwords stored in the database of the vulnerable application. The vulnerability exists due to insufficient sanitization of user-supplied input passed to the 'dbfield' parameter of the 'filter.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable script and view the hashes of the passwords stored in the database.

Audacity 1.2.6 (.gro file ) Local buffer overflow POC

When a .gro file containing long Chars is imported in Audacity 1.2.6, the program will crash and the EAX, ECX, EDX, EBX, ESP, EBP, ESI, EDI and EIP registers will be overwritten. This can be exploited to execute arbitrary code by creating a malicious .gro file and importing it in Audacity.

Remote SMS/MMS Denial of Service – ‘Curse Of Silence’ for Nokia S60 phones

Emails can be sent via SMS by setting the messages Protocol Identifier to 'Internet Electronic Mail' and formatting the message like this: <email-address><space><message body>. If such messages contain an <email-address> with more than 32 characters, S60 2.6, 2.8, 3.0 and 3.1 devices are not able to receive other SMS or MMS messages anymore. 2.6 and 3.0 devices lock up after only one message, 2.8 and 3.1 devices after 11 messages.

2Capsule Sticker Remote SQL Injection Vulnerability

A vulnerability exists in 2Capsule Sticker, which can be exploited by malicious people to conduct SQL injection attacks. Input passed via the 'id' parameter to 'sticker.php' isn't properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation may allow execution of arbitrary SQL commands.

Megacubo 5.0.7 download & Execute

A vulnerability in Megacubo 5.0.7 allows remote attackers to execute arbitrary code by using a malicious URL. The vulnerability is due to the application's failure to properly validate user-supplied input. An attacker can exploit this vulnerability by enticing an unsuspecting user to click on a malicious URL. Successful exploitation could result in the execution of arbitrary code in the context of the application.

Recent Exploits: