header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

FotoTagger v2.12.0.0 Buffer Overflow Vulnerabiltity

FotoTagger is prone to a buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. An attacker can exploit this issue to execute arbitrary code in the context of the application. Failed exploit attempts will likely result in a denial-of-service condition.

Batch Picture Watemark v1.0 (.jpg File) Crash Vulnerability Exploit

Batch Picture Protector is a powerful and easy-to-use batch image watermarking tool. It protects your digital images and artwork by adding professional transparent watermarks that combine text, illustrations and graphics. When used in conjunction with your favorite image editing software, a watermark can even contain your copyright, website url or logo image. Batch Picture Protector is the best way to achieve faster and simpler image protection. This watermarking software is particularly useful to designers, artists and banner makers who send artwork proofs to customers for evaluation. Those who publish images on internet web galleries can also protect image copyright using this watermarking software. By using the software, digital photos can be effectively protected from unauthorized use. This photo watermark software places permanent watermarks that cannot be removed.Batch Picture Protector is compatible with all major image formats, including JPEG, BM

Apple Safari Iphone Crash using tel

A buffer overflow vulnerability exists in Apple Safari on Iphone 3G, OS 3.0.1. Launch Safari, enter the page and after a few seconds Safari will crash and black screen will appear. The exploit code is a PHP script that sets a time limit of 0 and creates a variable with 100000 'A's. This variable is then used in an iframe src tag with a tel: prefix.

PHP Pro Bid Blind SQL Injection Exploit

This exploit allows an attacker to inject malicious SQL queries into a vulnerable web application. The malicious SQL query is sent to the web application, which then processes the query and returns the results. The attacker can then use the results to gain access to sensitive information stored in the database.

Recent Exploits: