Liquid Studio 2.17 is vulnerable to a denial of service attack when a maliciously crafted file is opened. An attacker can exploit this vulnerability by creating a file with a large number of characters and then opening it in Liquid Studio. This will cause the application to crash.
Pixel Studio 2.17 is vulnerable to a Denial of Service attack. By entering any character into the Pixel Studio Run / Enter Key, the application will crash. An attacker can exploit this vulnerability by creating a text file containing 10 'A' characters and then opening it with Pixel Studio.
Tree Studio 2.17 is vulnerable to a denial of service attack when a maliciously crafted file is opened. An attacker can exploit this vulnerability by creating a file with a large number of characters and then opening it in Tree Studio 2.17. This will cause the application to crash.
Selfie Studio 2.17 is vulnerable to a Denial of Service attack. By creating a file containing a payload of 10 'A' characters, the application will crash when the file is opened.
A SQL injection vulnerability exists in JoomCRM 1.1.1, a component for Joomla! CMS. An attacker can send a specially crafted HTTP request to the vulnerable application in order to execute arbitrary SQL commands in the back-end database.
A vulnerability in Joomla! Component JoomProject 1.1.3.2 allows an attacker to gain access to sensitive information such as user IDs, names, and emails. This is achieved by sending a specially crafted HTTP request to the vulnerable server, which will return a JSON response containing the sensitive information.
Code Blocks 17.12 is vulnerable to a local buffer overflow vulnerability when a user creates a new class with a long name. This can be exploited to execute arbitrary code by overflowing a buffer and overwriting the Structured Exception Handler (SEH) with a malicious payload.
A SQL injection vulnerability exists in OpenSource ERP v6.3.1, which allows an attacker to execute arbitrary SQL commands via the 'sqlend' parameter in a 'data.xml' POST request to the '/db/utils/query/' path. This can be exploited to gain access to the underlying database and potentially gain access to sensitive information.
eBrigade ERP 4.5 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to execute arbitrary SQL commands on the underlying database.
An attacker can exploit a SQL injection vulnerability in Event Locations 1.0.1 to execute arbitrary SQL commands on the underlying database.