header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Quicktech [Sql Injection Vulnerability]

A SQL injection vulnerability exists in Quicktech, which allows an attacker to execute arbitrary SQL commands on the underlying database. This can be exploited to manipulate data, disclose sensitive information, or gain access to the system. Affected versions include all versions of Quicktech.

Linux Kernel <= 2.6.37 local kernel DoS (CVE-2010-4165)

A divide by 0 error occurs in tcp_select_initial_window when processing user supplied TCP_MAXSEG facilitating a local denial-of-service condition (kernel oops!) in all Linux Kernel 2.6.x branch (2.6.37 & below). This issue can be triggered easily with a call to setsockopt() on a listening network socket and then establishing a TCP connection to the awaiting socket.

SnapProof (page.php) Sql Injection Vulnerability

An attacker can exploit this vulnerability by sending a crafted SQL query to the vulnerable page.php script. The attacker can use the 'pID' parameter to inject malicious SQL code into the query. This can allow the attacker to gain access to sensitive information from the database, such as user credentials and other confidential data.

DO-CMS Multiple Sql Injection Vulnerability

An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable application. This can be done by appending malicious SQL queries to the vulnerable parameter in the URL. For example, www.site.com/page.php?pid=null[Sql] and www.site.com/archives.php?pid=null[Sql]. An attacker can also use the UNION operator to retrieve data from the database. For example, www.site.com/page.php?pid=null+and+1=2+union+select+concat(username,0x3a,psword)+from+tbladmin_users and www.site.com/archives.php?pid=null+and+1=2+union+select+1,2,3,concat(username,0x3a,psword),5,6,7,8,9,10,11+from+tbladmin_users

Nitro PDF Reader 1.4.0 Remote Heap Memory Corruption / DoS PoC

The program suffers from a heap corruption vulnerability which can be exploited by malicious people to cause a denial of service and potentially compromise a vulnerable system. The vulnerability is caused when processing malicious PDF file which triggers a heap corruption state resulting in a crash.

Recent Exploits: