header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Nexusphp.v1.5 SQL injection Vulnerability

There is a SQL injection vulnerability in the thanks.php file of Nexusphp v1.5. The vulnerability is caused by not checking the $_POST['id'] parameter, allowing an attacker to perform an SQL injection attack. An attacker can exploit this vulnerability by using the payload _POST[id] : -1 union select version()>4/*

BlazeVideo HDTV Player 6.6 Professional (Universal DEP+ASLR Bypass)

This exploit bypasses Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) in BlazeVideo HDTV Player 6.6 Professional. It allows an attacker to execute arbitrary code on a vulnerable system. The exploit takes advantage of a buffer overflow vulnerability in the software.

Google Chrome < 14.0.835.163 PDF File Handling Memory Corruption Vulnerability (CVE-2011-2841)

Google Chrome suffers from a memory corruption vulnerability that occurs in the manipulation of PDF files. The failure occurs when the browser opens an HTML file that contains multiple tag <IFRAME> pointing to a PDF file. So it is a memory corruption flaw allows code to run within the sandbox.

Adobe Photoshop Elements 8.0 Multiple Arbitrary Code Execution Vulnerabilities

Photoshop Elements 8 suffers from a buffer overflow vulnerability when dealing with .ABR (brushes) and .GRD (gradients) format files. The application fails to sanitize the user input resulting in a memory corruption, overwriting several memory registers which can aid the attacker to gain the power of executing arbitrary code on the affected system or denial of service scenario.

fbsd-uipcsock-heap.sh

Proof-of-concept crash for the FreeBSD Unix domain sockets heap overflow. This was tested on FreeBSD 8.2-RELEASE. This PoC will usually result in a kernel panic with a read access violation at 0x616161XX but sometimes the kernel will not crash straight away (particularly if you shorten the length of 'sun_path' -- try 140 bytes), and your uid (see output of `id`) may have been modified to the decimal equivalent of 0x61616161 during the heap smash.

Norman Security Suite 8 Kernel Pointer Dereferencement Vulnerability

The driver 'nprosec.sys' in Norman Security Suite 8 is vulnerable to a kernel pointer dereferencement. An attacker with local access to the machine can exploit this vulnerability to escalate their privileges and gain SYSTEM privileges from a limited account.

WordPress Mingle Forum plugin <= 1.0.31 SQL Injection Vulnerability

This vulnerability allows an attacker to inject SQL queries into the WordPress Mingle Forum plugin version 1.0.31. By manipulating the POST data, an attacker can execute arbitrary SQL queries, potentially leading to unauthorized access or data leakage.

Recent Exploits: