header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

HT-MP3Player 1.0 (.ht3 File) Local buffer Overflow (seh)

HT-MP3Player 1.0 is vulnerable to a local buffer overflow vulnerability when a maliciously crafted .ht3 file is opened. This can be exploited to execute arbitrary code by overwriting the SEH handler with a pointer to malicious code and then a NOP sled followed by shellcode.

Joomla Component com_k2 (sectionid) SQL injection Vulnerability

A vulnerability exists in the Joomla Component com_k2 (sectionid) which allows an attacker to inject arbitrary SQL commands. An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable parameter. This can allow the attacker to view, add, modify or delete records in the back-end database.

VideoLAN VLC Media Player 0.9.9 smb:// URI Stack-based Buffer Overflow (Proof-of-Concept)

VideoLAN VLC Media Player 0.9.9 is vulnerable to a stack-based buffer overflow when handling a specially crafted smb:// URI. The vulnerability can also be triggered via the VLC web interface (disabled by default). The vulnerability can be exploited by sending a specially crafted XSPF playlist file to the vulnerable system. This will cause a stack-based buffer overflow and allow arbitrary code execution.

Joomla Component com_php (id) Blind SQL-injection Vulnerability

A Blind SQL injection vulnerability exists in Joomla Component com_php (id) which allows an attacker to execute arbitrary SQL commands on the vulnerable system. The vulnerability is due to improper input validation of the 'id' parameter in the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL commands to the vulnerable system. This can result in unauthorized access to sensitive information stored in the database.

Virtue Online Test Generator (AB/SQL/XSS) Multiple Remote Vulnerabilities

Virtue Online Test Generator is vulnerable to authentication bypass, SQL injection and Cross-Site Scripting. After user login, an attacker can bypass authentication by accessing the admin/index.php page. An attacker can also inject SQL queries by accessing the admin/test_generator.php page with a malicious SQL query. Additionally, an attacker can inject XSS payloads by accessing the admin/test_generator.php page with a malicious XSS payload.

Recent Exploits: