header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Adobe Photoshop CS4 Extended 11.0 ASL File Handling Remote Buffer Overflow PoC

Adobe Photoshop CS4 Extended suffers from a buffer overflow vulnerability when dealing with .ASL (styles) format file. The application failz to sanitize the user input resulting in a memory corruption, overwriting several memory registers which can aid the atacker to gain the power of executing arbitrary code or denial of service.

Adobe Photoshop CS4 Extended 11.0 GRD File Handling Remote Buffer Overflow PoC

Adobe Photoshop CS4 Extended suffers from a buffer overflow vulnerability when dealing with .GRD (gradients) format file. The application failz to sanitize the user input resulting in a memory corruption, overwriting several memory registers which can aid the atacker to gain the power of executing arbitrary code or denial of service.

Adobe Photoshop CS4 Extended 11.0 ABR File Handling Remote Buffer Overflow PoC

Adobe Photoshop CS4 Extended suffers from a buffer overflow vulnerability when dealing with .ABR (brushes) format file. The application failz to sanitize the user input resulting in a memory corruption, overwriting several memory registers which can aid the atacker to gain the power of executing arbitrary code or denial of service.

RapidWareX v2.0.1 (WebUI) CSRF Exploit

RapidWareX v2.0.1 (WebUI) is prone to a post-authentication CSRF vulnerability, which allows the attacker to have control over certain actions for the downloader such as Start/Retry, Pause, Clear All, Clear Finished, Add Links, etc. The example below clears all the downloads when the victim enters the page.

Multi Vendor Mall (pages.php) SQL Injection Vulnerability

A SQL injection vulnerability exists in Multi Vendor Mall (pages.php) which allows an attacker to execute arbitrary SQL commands on the underlying database. An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable parameter 'id' in the 'pages.php' script. An example of a malicious SQL query is 'http://[site]/pages.php?id=7+union+select+group_concat(EMAIL,0x3a3a,PASSWORD,0x3c62723e)+from+members_tbl--'

Spaceacre (SQL/XSS/HTML) Injection Vulnerabilities

Spaceacre is vulnerable to SQL/XSS/HTML injection. An attacker can inject malicious SQL/XSS/HTML code into the vulnerable parameters of the application. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code, to disclose sensitive information from the database, to execute arbitrary HTML and script code in the browser of the victim, to bypass authentication and authorization mechanisms, and to perform a wide range of other malicious activities.

Webit Cms SQL Injection Vulnerability

A SQL injection vulnerability exists in Webit CMS, which allows an attacker to execute arbitrary SQL commands on the underlying database. The vulnerability is due to insufficient sanitization of user-supplied input in the 'sid' parameter of the 'main.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL commands to the vulnerable script. This can allow the attacker to gain access to sensitive information stored in the database, modify or delete data, or even execute arbitrary system commands on the server.

Design by web5000 (page_show) SQL Injection Vulnerability

A vulnerability exists in the page_show.php script of Design by web5000, which allows an attacker to inject arbitrary SQL commands. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code in the 'id' parameter in the 'page_show.php' script.

Open&Compact Ftp Server 1.2 Universal Pre-Auth Denial of Service

Open&Compact Ftp Server 1.2 is vulnerable to a Universal Pre-Auth Denial of Service attack. This attack is caused by sending a specially crafted command with a large amount of data to the server. This causes the server to crash and become unresponsive.

Recent Exploits: