header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

VLC Player 2.1.5 DEP Access Violation Vulnerability

VLC Media Player contains a flaw that is triggered as user-supplied input is not properly sanitized when handling a specially crafted FLV file. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code.

Joomla Component D4JeZine <= 2.8 Remote BLIND SQL Injection Exploit

This exploit allows an attacker to perform a blind SQL injection attack on the Joomla Component D4JeZine version 2.8 or below. The exploit uses a one character brute force technique to extract sensitive information from the database.

CygniCon CyViewer ActiveX Control Insecure Method Vulnerability

The CygniCon CyViewer ActiveX control is prone to a vulnerability caused by an insecure method. Successfully exploiting this issue will allow attackers to create or overwrite files within the context of the affected application (typically Internet Explorer) that uses the ActiveX control. Attackers may execute arbitrary code with user-level privileges.

Remote Denial-of-Service in RealityServer Web Services

Attackers can exploit this issue to cause the server to dereference an invalid memory location, resulting in a denial-of-service condition. Due to the nature of this issue arbitrary code-execution maybe possible; however this has not been confirmed.

Joomla! CMS Multiple Cross-Site Scripting Vulnerabilities

Joomla! CMS is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker can exploit these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

Multiple SQL Injection Vulnerabilities in Pretty Link Lite WordPress Plugin

The 'Pretty Link Lite' plugin for WordPress is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Recent Exploits: