header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla Component com_articlemanager SQL Injection Vulnerability

Admin login credentials can be obtained by exploiting a SQL injection vulnerability in the com_articlemanager component of Joomla. The vulnerable URL is http://[server]/index.php?option=com_articlemanager&Itemid=349&task=display&artid=. The exploit code is null/**/union/**/select/**/1,2,3,concat(username,0x3a,password)fl0rix,5,6,7,8/**/from/**/jos_users--

PSI CMS v. 0.3.1 SQLi Vulns

This product suffers from multiple SQLi vulnerabilities. The first exploit is a union-based SQL injection attack, which can be used to extract the version of the database, the database name, and the user. The other two exploits are parameter-based SQL injections, which can be used to execute arbitrary SQL queries.

NPlayer (.dat Skin File) Local Heap Overflow PoC

A local heap overflow vulnerability exists in NPlayer when a specially crafted .dat skin file is opened. This could allow an attacker to execute arbitrary code on the vulnerable system. The vulnerability is due to insufficient boundary checks when processing the .dat skin file. An attacker can exploit this vulnerability by enticing a user to open a malicious .dat skin file.

Nemesis Player (NSP) Local Denial of Service (DoS) Vulnerability

Rehan Ahmed discovered a Denial of Service vulnerability in Nemesis Player (NSP) versions 1.1 Beta and 2.2. The vulnerability is triggered when a maliciously crafted .nsp file is opened, causing the application to crash. The exploit code creates a file with 5000 'A' characters, which when opened in NSP, causes the application to crash.

Ofilter Player (skin.ini) Local Crash PoC

This exploit is a proof of concept for a local crash vulnerability in Ofilter Player. The vulnerability is caused due to a boundary error when handling the skin.ini file, which can be exploited by an attacker to cause a denial of service condition. The vulnerability is confirmed on Windows XP SP2. The exploit creates a file called skin1.ini with a length of 5000 bytes.

Populum SQL injection vulnerability

Populum version 2.3 is vulnerable to SQL injection. The vulnerable parameters are 'did' and 'id' in the URLs '127.0.0.1/populum/diarypage.php?did=[SQL injection]' and '127.0.0.1/populum/link.php?id=[SQL injection]'. An attacker can exploit this vulnerability to gain unauthorized access to the application.

Recent Exploits: