header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Xerver Source Disclosure and HTTP Auth Bypass

This module exploits a source code disclosure/download vulnerability in versions of the Xerver web server up to and including version 4.32. It also incorporates an authentication bypass vulnerability that allows you to dump the source of files in HTTP auth protected directories as well.

Xion Audio Player Buffer Overflow

A buffer overflow vulnerability exists in Xion Audio Player version 1.0.125. The vulnerability is caused due to a boundary error when handling specially crafted .m3u files. This can be exploited to cause a stack-based buffer overflow by tricking a user into opening a specially crafted .m3u file. Successful exploitation may allow execution of arbitrary code.

Concept E-commerce SQL Injection Vulnerability

The vulnerability exists in the product_list.php and news.php files of the Concept E-commerce website. An attacker can inject malicious SQL code into the 'id' parameter of the product_list.php and news.php files, which can be used to extract sensitive information from the database.

BarCodeWiz Barcode ActiveX Control 3.29 PoC (SEH)

BarCodeWiz Barcode ActiveX Control 3.29 is vulnerable to a SEH overwrite vulnerability. The vulnerability is triggered when a specially crafted argument is passed to the LoadProperties method. This causes the SEH to be overwritten with the value 0x41414141, which allows arbitrary code execution.

Joomla “com_beamospetition” Sql Injection Vulnerability

The component "com_beamospetition" is vulnerable to SQL Injection. An attacker can inject arbitrary SQL queries by manipulating the "pet" parameter in the URL. For example, http://www.site.com/path/index.php?option=com_beamospetition&startpage=3&pet=-1+Union+select+user()+from+jos_users--

Recent Exploits: