header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Corel VideoStudio Pro X3 – Boundary Condition Error

This exploit takes advantage of a boundary condition error in Corel VideoStudio Pro X3. By inserting a specially crafted media file into the timeline, an attacker can cause an access violation, leading to potential code execution.

SEH vulnerability in batchaudio_setup.exe

This exploit takes advantage of a SEH (Structured Exception Handling) vulnerability in the batchaudio_setup.exe software. It uses a combination of junk data, a non-SEH overwrite (nseh), and a SEH overwrite (seh) to gain control of the program's execution flow. The exploit then executes a payload that opens the Windows calculator (calc.exe). The exploit has been tested on Windows XP SP2.

Netware SMB Remote Stack Overflow

A vulnerability exists in the Netware CIFS.NLM driver which allows an attacker to trigger a kernel stack overflow by sending a specific 'Sessions Setup AndX' query. Successful exploitation of this issue will result in remote code execution with kernel privileges. Failed attempts may result in a remote denial of service.

SAS Hotel Management System SQL Vulnerable

SAS Hotel Management System is vulnerable to SQL Injection. This vulnerability allows an attacker to manipulate the database by injecting malicious SQL queries. The exploit can be used to extract sensitive information, modify or delete data, or even gain unauthorized access to the system.

PHP Online Jobs Authentication Bypass

PHP Online Jobs is an Extensive and Powerful script written in PHP to launch your own jobs portal with quality features (upload resume, resume search, pound sterling payments and much much more). It has a very high potential to generate very heavy online revenues for you. Script is built with a focus on increases ease of users and profits of webmasters.

Digital Interchange Document Library SQL Vulnerability

The Digital Interchange Document library allows you to easily and seamlessly store your documents online! The administration area is a secured area with an intuitive interface that will let you manage all of your documents from any location with an internet connection. By storing your documents in folders you setup in the Document Library, you will be able to quickly and easily organize and access the information you need most.

Yamamah Photo Gallery 1.00 (download.php) Local File Disclosure Vulnerability

The vulnerability allows an attacker to disclose local files on the target system by exploiting a flaw in the 'download.php' script of Yamamah Photo Gallery version 1.00. By manipulating the 'download' parameter, an attacker can traverse the file system and access sensitive files.

Collabtive v0.6.3 Multiple Vulnerabilities

The script is vulnerable to SQL injection because it fails to properly sanitize user-supplied input to the 'uid' parameter in the 'managechat.php' script. An attacker can exploit this vulnerability to execute arbitrary SQL code on the underlying database. Additionally, the script is also vulnerable to arbitrary file upload, allowing an attacker to upload malicious files to the server. This vulnerability was first discovered and reported by DNX. The password stored in the database is encoded with sha1.

Recent Exploits: