header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

QQPlayer cue File Buffer Overflow Exploit

QQPlayer cue File Buffer Overflow Exploit is a vulnerability in QQPlayer which allows an attacker to execute arbitrary code by overflowing a buffer in the application. The vulnerability is caused due to a boundary error when handling cue files. By sending a specially crafted cue file, an attacker can cause a buffer overflow and execute arbitrary code.

RapidLeech Scrits Remote File Upload ( upload shell php )

RapidLeech scripts are vulnerable to remote file upload. An attacker can upload a malicious file to the server by changing the name of the shell code to shell.php.001 or shell.php.00 and then accessing it via the URL http://site.com/0x14/shell.php.001 or http://site.com/0x14/shell.php.00

QQPlayer asx File Processing Buffer Overflow Exploit

QQPlayer is vulnerable to a buffer overflow when processing specially crafted .asx files. An attacker can exploit this vulnerability by sending a malicious .asx file to the victim, which when opened, will cause a buffer overflow and execute arbitrary code on the victim's machine. The vulnerability affects QQPlayer versions <=2.3.696.400p1 and is triggered when a specially crafted .asx file is opened. The payload used in this exploit is calc.

Microsoft Office Outlook Web Access for Exchange Server 2003 XSRF Vulnerability

A cross-site request forgery vulnerability in Microsoft Office Outlook Web Access for Exchange Server 2003 can be exploited to add an automatic forwarding rule (as PoC) to the authenticated user's account.

Imagine-cms 2.50

Imagine-cms version 2.50 is vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability to gain access to the application's database, including usernames and passwords stored in plaintext. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'page' parameter of the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable application.

php_chat Remote File inclusion Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'select_db' parameter to the 'login_chat.php' script. A remote attacker can send a specially crafted HTTP request containing an arbitrary file name in the 'select_db' parameter, which will be included and executed by the vulnerable script. This can be exploited to execute arbitrary PHP code on the vulnerable system.

Lithtech engine Memory Corruption Vulnerability

Through a malformed packet is possible to corrupt the memory of the game with effects that seem to suggest the possibility for an attacker to do something more than the crashing of the server. Indeed the problem affects some function pointers so it's not exclude the possibility to execute arbitrary code.

Joomla Component com_spa SQL Injection Vulnerability

A vulnerability exists in Joomla Component com_spa, which allows an attacker to inject malicious SQL commands via the 'pid' parameter in the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable script. This can result in the disclosure of sensitive information from the database, such as usernames and passwords.

Mayasan Portal v2.0 ( makaledetay.asp?id= ) Remote Sql inj

Mayasan Portal v2.0 is vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to the database and execute arbitrary SQL commands.

Recent Exploits: