header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Biblioteca 1.0 Beta Joomla Component Multiple SQL Injection Vulnerabilities

The parameter testo passed to bi.php (site and admin frontends) is properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. The parameter testo passed to stampa.php, pdf.php and models/biblioteca.php (when 'view' is set to 'biblioteca') is properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

PlayPad Music Player v1.12 .mp3 File Processing BoF/Crash

A buffer overflow vulnerability exists in PlayPad Music Player v1.12 when processing .mp3 files. By creating a specially crafted .mp3 file and loading it into the player, an attacker can cause a crash, resulting in a denial of service condition.

Karaoke Video Creator Denial of Service Vulnerability

A buffer overflow vulnerability exists in Karaoke Video Creator 2.2.8, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to a boundary error when processing a specially crafted .PK2 file. This can be exploited to cause a stack-based buffer overflow via an overly long string. Successful exploitation may allow execution of arbitrary code, but this has not been confirmed.

Joomla Component com_extcalendar Blind SQL Injection Vulnerability

A Blind SQL Injection vulnerability exists in the Joomla Component com_extcalendar. An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable parameter extid in the cal_popup.php file. This can allow the attacker to gain access to sensitive information from the database.

FreeBSD x86/x64 Sendfile Cache Local Root XPL v2

This exploit allows a local user to gain root privileges on a vulnerable FreeBSD system. The exploit works by tampering with the /bin/sh file to contain a shellcode which does 'chmod a+s /tmp/sh', 'chown root /tmp/sh' and 'execve /tmp/sh2'. The exploit then uses a network connection to send the modified /bin/sh file to the vulnerable system and executes it as root.

Recent Exploits: