header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Liquid Studio 2.17 – Denial of Service (PoC)

Liquid Studio 2.17 is vulnerable to a denial of service attack when a maliciously crafted file is opened. An attacker can exploit this vulnerability by creating a file with a large number of characters and then opening it in Liquid Studio. This will cause the application to crash.

Pixel Studio 2.17 – Denial of Service (PoC)

Pixel Studio 2.17 is vulnerable to a Denial of Service attack. By entering any character into the Pixel Studio Run / Enter Key, the application will crash. An attacker can exploit this vulnerability by creating a text file containing 10 'A' characters and then opening it with Pixel Studio.

Tree Studio 2.17 – Denial of Service (PoC)

Tree Studio 2.17 is vulnerable to a denial of service attack when a maliciously crafted file is opened. An attacker can exploit this vulnerability by creating a file with a large number of characters and then opening it in Tree Studio 2.17. This will cause the application to crash.

Joomla! Component JoomProject 1.1.3.2 – Information Disclosure

A vulnerability in Joomla! Component JoomProject 1.1.3.2 allows an attacker to gain access to sensitive information such as user IDs, names, and emails. This is achieved by sending a specially crafted HTTP request to the vulnerable server, which will return a JSON response containing the sensitive information.

Code Blocks 17.12 – Local Buffer Overflow (SEH)(Unicode)

Code Blocks 17.12 is vulnerable to a local buffer overflow vulnerability when a user creates a new class with a long name. This can be exploited to execute arbitrary code by overflowing a buffer and overwriting the Structured Exception Handler (SEH) with a malicious payload.

OpenSource ERP SQL Injection

A SQL injection vulnerability exists in OpenSource ERP v6.3.1, which allows an attacker to execute arbitrary SQL commands via the 'sqlend' parameter in a 'data.xml' POST request to the '/db/utils/query/' path. This can be exploited to gain access to the underlying database and potentially gain access to sensitive information.

Recent Exploits: