header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

JetAudio 7.5.3.15 Local Crash PoC

A buffer overflow vulnerability exists in JetAudio 7.5.3.15 due to improper bounds checking of user-supplied input. An attacker can exploit this vulnerability by creating a specially crafted M3U file containing an overly long string, which can cause a denial of service condition when the file is opened.

JetAudio 7.1.9.4030 Universal Stack Overflow Exploit (SEH)

JetAudio 7.1.9.4030 is vulnerable to a stack overflow vulnerability when a specially crafted M3U file is opened. This allows an attacker to execute arbitrary code on the vulnerable system. The vulnerability is due to a lack of bounds checking when parsing the M3U file. By supplying a large number of 'http://' strings, an attacker can overwrite the SEH chain and execute arbitrary code.

FreeBSD 7.2-RELEASE SCTP Local Kernel DoS

This exploit is based on an unfixed bug found in FreeBSD 7.2-RELEASE. It is a local kernel DoS (kern panic) exploit which is only tested on 7.2-RELEASE, but probably older and newer builds are vulnerable as well. The exploit uses a socket connection to send a malicious packet to the target system, which causes a kernel panic.

Portel (patron) Blind SQL-injection Vulnerability

Portel is a content management system (CMS) developed by a Colombian company. It is vulnerable to Blind SQL injection, which allows an attacker to execute arbitrary SQL commands on the underlying database. An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable application. For example, an attacker can send a malicious SQL query to the vulnerable application as follows: http://localHost/path/libreria/php/decide.php?patron=n<Blind Sql Code>, where n is a valid patron. This can be demonstrated by sending the following requests to the vulnerable application: http://www.bogota.gov.co/portel/libreria/php/decide.php?patron=01.'+and+1=1/* (true) and http://www.bogota.gov.co/portel/libreria/php/decide.php?patron=01.'+and+1=2/* (false).

OpenNews 1.0 (SQLI/RCE) Multiple Remote Vulnerabilities

OpenNews 1.0 is vulnerable to SQL Injection (Auth Bypass) and Remote Command Execution. An attacker can bypass authentication by entering ' or ' 1=1 as the username and any value as the password. An attacker can also execute arbitrary commands by entering ';system(YOUR COMMAND);' in the Overall Width field and then accessing the config.php page.

AccessoriesMe PHP Affiliate Script v1.4 (bSQL-XSS) Multiple Remote Vulnerabilities

AccessoriesMe PHP Affiliate Script v1.4 is prone to multiple remote vulnerabilities, including a cross-site scripting vulnerability and a blind SQL injection vulnerability. An attacker can exploit these issues to execute arbitrary HTML and script code in the browser of an unsuspecting user in the context of the affected site, to steal cookie-based authentication credentials, to control how the site is rendered to the user, to access sensitive information, and to exploit vulnerabilities in the underlying database.

UltraPlayer Media Player 2.112

UltraPlayer Media Player 2.112 is vulnerable to a buffer overflow vulnerability due to improper bounds checking when handling specially crafted .usk files. By creating a .usk file with an overly long string, an attacker can overwrite the EIP register and execute arbitrary code. This vulnerability is identified by CVE-2009-2745.

Tenrok 1.1.0 (UDD/RCE) Multiple Remote Vulnerabilities

Tenrok 1.1.0 is vulnerable to users data disclosure and remote command execution. An attacker can access the userpwd.txt file to view the users data and can execute remote commands by writing a malicious code in the Title field of post.php and then accessing the display.php page with the command as a parameter.

MyBackup 1.4.0 Remote File Inclusion (AFD/RFI) Multiple Remote Vulnerabilities

MyBackup 1.4.0 is vulnerable to Remote File Inclusion (RFI) and Arbitrary File Download (AFD) attacks. An attacker can exploit this vulnerability by sending a malicious URL to the application. The malicious URL can be used to download arbitrary files from the server or to execute malicious code on the server.

Recent Exploits: