header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Remote Inclusion and SQL Injection Vulnerabilities in RechnungsZentrale V2

RechnungsZentrale V2 version 1.1.3 and likely older versions are vulnerable to Remote Inclusion and SQL Injection. An attacker can exploit this vulnerability by sending a malicious HTTP request to the vulnerable server with the rootpath parameter set to a malicious URL. Additionally, an attacker can use a specially crafted username and password to bypass authentication and gain access to the system.

AVIPreview 0.26 Alpha Denial of Service Vulnerability

AVIPreview 0.26 Alpha is vulnerable to a Denial of Service attack. The application reads memory via a null pointer, causing an Access Violation Exception. An attacker can force something malicious to the ECX register (.data is RW) and gain code execution. To exploit this vulnerability, an attacker must open a specially crafted AVI file in AVIPreview, select 'No' when the MessageBox with an error appears, navigate to the File menu and pick the recent file (which points to the AVI file). This will cause the application to crash.

Exploit Buffer Overflow CoolZip 2.0

Exploit Buffer Overflow CoolZip 2.0 is a vulnerability in CoolZip 2.0 which allows an attacker to execute arbitrary code by overflowing a buffer in the program. The exploit is created by using a specially crafted ZIP file which contains a large amount of data. When the file is opened, the buffer is overflowed and the attacker can execute arbitrary code.

PHP Net Tools Remote Code Execution Exploit

This exploit allows an attacker to execute arbitrary code on a vulnerable server running PHP Net Tools. The vulnerability is due to insufficient sanitization of user-supplied input to the 'host' parameter of the 'nettools.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP POST request containing an arbitrary command to the vulnerable server.

Internet PhotoShow Remote File Inclusion Exploit

Internet PhotoShow is prone to a remote file-inclusion vulnerability because it fails to sufficiently sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code within the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.

Recent Exploits: