header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

FlexNet License Server Manager Vulnerability

FlexNet License Server Manager is affected by a stack buffer overflow vulnerability in the function that copies data received after the header into a buffer smaller than the required bytes. This vulnerability can be exploited remotely against the server.

AnvSoft Any Video Converter 4.3.6 unicode buffer overflow

This exploit triggers a buffer overflow in AnvSoft Any Video Converter 4.3.6. By generating a .reg file, executing it, and then opening the application, the exploit is triggered. The exploit uses a unicode buffer overflow to execute arbitrary code.

Sockso

The username input on the registration page is not sanitized, allowing for a persistent XSS vulnerability. An attacker can inject malicious JavaScript code as the username, which is then stored in the database and displayed in the admin panel and user pages. This vulnerability can be exploited remotely. The exploit can also retrieve the admin cookie session.

Adobe Photoshop CS5.1 U3D.8bi Library Collada Asset Elements Unicode Conversion Stack Based Buffer Overflow

The exploit is a Unicode Conversion Stack Based Buffer Overflow that occurs when processing overlong asset elements in Adobe Photoshop CS5.1 U3D.8bi Library Collada. By exploiting this vulnerability, an attacker could be able to return inside an ASCII memory region with an ultra large nop through assigning eip to ex. Photoshop.00630041. The shellcode should be alphabetic.

PHP 5.4 (5.4.3) Code Execution 0day (Win32)

This exploit takes advantage of a bug with Variant type parsing in PHP 5.4.3. It allows an attacker to execute arbitrary code on a vulnerable system. The exploit is in the form of an HTML page and a PHP script. The HTML page repeatedly sends requests to the PHP script with different offsets to attempt to exploit the vulnerability. The PHP script performs some operations with the offset value and then executes the payload.

Recent Exploits: