header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Native Instruments Traktor Pro 1.2.6 Stack-based Buffer Overflow Vulnerability

Traktor Pro suffers from a stack buffer overflow vulnerability when parsing playlist files (.nml) resulting in a crash. The user input is not properly sanitized which may give the attackers the possibility for an arbitrary code execution on the affected system. Failure of exploitation may result in a denial of service.

DVD Rental Software SQL injection Vulnerability

An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable application. The malicious query can be sent via the 'cat_id' parameter in the URL. The attacker can use the UNION operator to append the malicious query to the existing query and extract sensitive information from the database.

CSRF Change Admin Password by OR4NG.M4N

This exploit allows an attacker to change the admin password of PloggerGallery Version 1.0 by using a Cross-Site Request Forgery (CSRF) attack. The attacker can set the admin username, email, password, and confirm password fields to any value they choose. The exploit is triggered when the attacker submits the form.

Minishare 1.5.5 Buffer Overflow Vulnerability (users.txt) – EggHunter Version

A buffer overflow vulnerability exists in Minishare 1.5.5 due to improper bounds checking of user-supplied input. An attacker can exploit this vulnerability by placing a specially crafted users.txt file in the Minishare root directory and running minishare.exe. This will allow the attacker to execute arbitrary code on the vulnerable system.

blind SQL Injection Vulnerabilities

An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable application. This can be done by appending malicious SQL queries to the vulnerable parameter in the URL. For example, http://127.0.0.1/clip/index.php?v=11+and+1=0+union+select+1,concat%28uname,passwd%29,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27+from+members--

REMOTE CSRF Change Admin Password by OR4NG.M4N & REMOTE CSRF upload ShElL by OR4NG.M4N

This exploit allows an attacker to change the admin password of the phpgallery v 1.1.0 software and upload a shell to the gallery. The attacker can use the code provided by the author and save it in a file csrf.html. When the file is opened, the attacker can change the admin password and upload a shell to the gallery.

ViArt SHOP multiple vulnerabilities

Input passed via the "rnd" parameter to products_search.php is not properly sanitised before being used in a SQL query. Input passed via the "filter" parameter to products.php is not properly sanitised before being used in a SQL query. Input passed to the "search_category_id" and "category_id" parameters in ads.php is not properly sanitised before being returned to the user. Input passed to the "category_id" parameter in article.php and articles.php is not properly sanitised before being returned to the user. Input passed to the "rp" parameter in basket.php and product_details.php is not properly sanitised before being returned to the user. Input passed to the "postal_code" parameter in shipping_calculator.php is not properly sanitised before being returned to the user. Input passed to the "s_fds" , "s_tit" ,"s_cod" parameters in search.php is not properly sanitised before being returned to the user. Input passed to the "s_sds" parameter in ads_search.php is not properly sanitised before being returned to the user. user_profile.php vulnerable parameter "return_page"

FozzCom shopping<= 7.94+8.04 Multiple Remote Vulnerabilities

Multiple vulnerabilities have been discovered in FozzCom shopping, which can be exploited by malicious people to conduct SQL injection attacks, disclose sensitive information, bypass certain security restrictions, and potentially compromise a vulnerable system.

Mosets Tree 2.1.6 (Joomla) Template Overwrite CSRF

Mosets Tree 2.1.6 is vulnerable to Cross-Site Request Forgery (CSRF) attacks. An attacker can exploit this vulnerability by getting a logged in admin to click the wrong link. This will allow the attacker to overwrite the template page with arbitrary code. This vulnerability was patched in version 2.1.7.

chCounter <= 3.1.3 SQLInjection

When accessing administration/index.php?cat=downloads&edit=VALID_ID and using a valid download id, an attacker is able to manipulate the "anzahl" parameter to perform queries which only involve returning an integer. The query output will be sent back to the client in the "anzahl" text input.

Recent Exploits: