header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PHP 5.3.3/5.2.14 ZipArchive::getArchiveComment NULL Pointer Deference

ZipArchive enables you to transparently read or write ZIP compressed archives and the files inside them. ZipArchive::getArchiveComment — Returns the Zip archive comment. The ZipArchive::getArchiveComment method returns a string from the zip_get_archive_comment() function, which can return NULL and -1.

Joomla Component ccinvoices SQL Injection Vulnerability

An unauthenticated attacker can exploit a SQL injection vulnerability in the Joomla com_ccinvoices component to gain access to admin login credentials. The vulnerability exists in the index.php file, where user-supplied input passed via the 'id' parameter is not properly sanitized before being used in a SQL query. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable application. This can allow the attacker to gain access to sensitive information stored in the database.

Avidemux <= 2.5.4 Buffer Overflow PoC

Avidemux is a free video editor designed for simple cutting, filtering and encoding tasks. A buffer overflow vulnerability exists in Avidemux versions prior to 2.5.4. The vulnerability is caused due to an error in the application when handling a specially crafted .prj file. This can be exploited to cause a stack-based buffer overflow by tricking a user into opening a malicious .prj file. Successful exploitation may allow execution of arbitrary code.

Adobe Flash Integer Overflow

When Parsing an ActionIf ActionScript statement four args are passed to the function, an integer named i , a ubyte named ActionCode, a ushort named Length, and a short named BranchOffset. If the BranchOffset is -305 or smaller it will cause an Access Violation when reading data from a invalid memory address. The last 16-bits of the address are controlable with the size of the BranchOffset argument. Any data which is in a valid segment of memory near the controlled address can be read causing Memory Disclosure. This would be used well in combination with a memory corruption vulnerability in order to bypass ASLR.

Avast! Internet Security aswtdi.sys 0day Local DoS PoC

This exploit is a proof-of-concept for a local denial of service vulnerability in Avast! Internet Security. The vulnerability is caused by a buffer overflow in the aswtdi.sys driver, which is triggered when a specially crafted DeviceIoControl call is made with the 0x80000004 IOCTL code. This causes the system to crash.

XPLPDF Adobe Reader 9.4.1 – ‘util.printf()’ Buffer Overflow (SEH)

XPLPDF is a proof-of-concept exploit for Adobe Reader 9.4.1. It exploits a buffer overflow vulnerability in the 'util.printf()' JavaScript function when processing a specially crafted PDF file. The vulnerability is triggered when a user opens a malicious PDF file with Adobe Reader 9.4.1. The exploit uses a SEH overwrite technique to gain code execution.

Table Position Absolute Clip Rect 0 Vulnerability

A vulnerability in the HTML table tag with the style attribute set to position:absolute;clip:rect(0) allows an attacker to inject malicious JavaScript code into a web page. The code is executed when the page is rendered in the browser. This vulnerability affects all versions of Internet Explorer prior to version 8.0. The vulnerability can be exploited by an attacker to gain access to sensitive information or to execute malicious code on the user's system.

GSPlayer 1.83a Win32 Release Buffer Overflow Vulnerability

GSPlayer 1.83a Win32 Release is vulnerable to a buffer overflow vulnerability. An attacker can exploit this vulnerability by creating a malicious .m3u file containing a specially crafted payload and sending it to the victim. When the victim opens the malicious file, the payload will be executed, allowing the attacker to execute arbitrary code on the victim's system.

JBI CMS SQL Injection Vulnerability

A SQL injection vulnerability exists in JBI CMS, which allows an attacker to execute arbitrary SQL commands via the 'id' parameter in the 'news_details.php' script. An attacker can exploit this vulnerability to gain access to the application's database, including sensitive information such as usernames and passwords. The vulnerable script is located at '/path/news_details.php' and the login pages for members and admins are located at '/member.php' and '/admin.php' respectively.

Recent Exploits: