header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PIPL <= 2.5.0 (.m3u File) Universal bof exploit (SEH)

A buffer overflow vulnerability exists in Pipl 2.5.0, which allows an attacker to execute arbitrary code by sending a specially crafted .m3u file. The vulnerability is due to the application not properly validating the length of user-supplied data before copying it to a fixed-length buffer. An attacker can exploit this vulnerability by sending a malicious .m3u file to the target system, which will trigger a stack-based buffer overflow and allow the attacker to execute arbitrary code on the target system.

Joomla Component com_digifolio 1.52 (id) SQL Injection Vulnerability

An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable application. This can be done by appending the malicious SQL query to the vulnerable parameter in the HTTP request. The malicious SQL query can be used to extract sensitive information from the database, modify the existing data, execute administration operations on the database, etc.

allomani 2007 <= SQL Injection Vulnerability

An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable application. This can be done by manipulating the 'cat' parameter in the 'browse' action of the vulnerable application. An attacker can use the UNION operator to combine the results of two or more SELECT statements into a single result set.

Multiple security issues in Open Auto Classifieds

Open Auto Classifieds is a vehicle listings manager that is popular with car dealer websites. It's written in PHP + MySQL and is available free at http://openautoclassifieds.com/. Multiple vulnerabilities exist in Open Auto Classifieds. These vulnerabilities can be exploited to allow access to read any information from the database, attack web browser clients through the web site, disclose the file path of the application and execute any arbitrary command on the web server.

Discuz! Plugin Crazy Star <= 2.0 Sql injection Vulnerability

Discuz! Plugin Crazy Star version 2.0 is vulnerable to a SQL injection vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to sensitive information such as usernames and passwords stored in the database.

Moa Gallery <= 1.2.0 Remote File Disclosure Vulnerability

Moa Gallery version 1.2.0 and prior are vulnerable to a remote file disclosure vulnerability. The vulnerability exists due to insufficient sanitization of user-supplied input to the 'p_filename' parameter in the '_template_parser.php' script. An attacker can exploit this vulnerability to disclose sensitive files from the server.

Recent Exploits: