header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Mozilla Firefox Array.reduceRight() Integer Overflow Exploit

The Mozilla Firefox browser is vulnerable to an integer overflow exploit in the Array.reduceRight() function. This vulnerability allows an attacker to bypass DEP (Data Execution Prevention) and ASLR (Address Space Layout Randomization) protections using a Java MSVCR71 sayonara rop chain. The exploit has been tested on Windows 7 Ultimate with Firefox versions 3.6.16 and 3.6.17.

Nexusphp.v1.5 SQL injection Vulnerability

There is a SQL injection vulnerability in the thanks.php file of Nexusphp v1.5. The vulnerability is caused by not checking the $_POST['id'] parameter, allowing an attacker to perform an SQL injection attack. An attacker can exploit this vulnerability by using the payload _POST[id] : -1 union select version()>4/*

BlazeVideo HDTV Player 6.6 Professional (Universal DEP+ASLR Bypass)

This exploit bypasses Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) in BlazeVideo HDTV Player 6.6 Professional. It allows an attacker to execute arbitrary code on a vulnerable system. The exploit takes advantage of a buffer overflow vulnerability in the software.

Google Chrome < 14.0.835.163 PDF File Handling Memory Corruption Vulnerability (CVE-2011-2841)

Google Chrome suffers from a memory corruption vulnerability that occurs in the manipulation of PDF files. The failure occurs when the browser opens an HTML file that contains multiple tag <IFRAME> pointing to a PDF file. So it is a memory corruption flaw allows code to run within the sandbox.

Recent Exploits: