header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

AFDKO Font Handling Library Memory Corruption Vulnerability

The AFDKO font handling library in Adobe Font Development Kit for OpenType (AFDKO) is susceptible to memory corruption issues, such as buffer overflows, due to the lack of sanity checks on input data. This vulnerability can be triggered by providing an input file that does not conform to the format specification.

Karenderia CMS 5.3 – Multiple SQL Vuln.

The Karenderia CMS 5.3 is vulnerable to multiple SQL injection vulnerabilities. An attacker can exploit these vulnerabilities by injecting malicious SQL queries through the 'street-name' parameter. This can lead to unauthorized access, data leakage, or remote code execution.

Exchange 2003 SP0 base64-MIME memory corruption

This exploit targets a memory corruption vulnerability in Exchange 2003 SP0. The vulnerability is triggered when processing a base64-MIME encoded email. By sending a specially crafted email, an attacker can corrupt the memory of the Exchange server, potentially leading to remote code execution.

Mac OS X TimeMachine (tmdiagnose) Command Injection Privilege Escalation

This module exploits a command injection in TimeMachine on macOS <= 10.14.3 in order to run a payload as root. The tmdiagnose binary on OSX <= 10.14.3 suffers from a command injection vulnerability that can be exploited by creating a specially crafted disk label. The tmdiagnose binary uses awk to list every mounted volume, and composes shell commands based on the volume labels. By creating a volume label with the backtick character, we can have our own binary executed with root privileges.

Ace Image Hosting Script SQL Injection Vulnerability

The vulnerability allows an attacker to pull user's information from the database by exploiting a SQL injection vulnerability in the Ace Image Hosting Script. By sending a specially crafted request to the albums.php file, an attacker can retrieve user's information including their username and password.

Recent Exploits: