header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

SpotAuditor 5.3.2 – ‘Base64’ Local Buffer Overflow (SEH)

This exploit targets a local buffer overflow vulnerability in SpotAuditor 5.3.2. By sending a specially crafted payload, an attacker can overwrite the Structured Exception Handler (SEH) and gain control of the program's execution flow.

PRO-7070 Hazir Profesyonel Web Sitesi 1.0 – Authentication Bypass

This exploit allows an attacker to bypass authentication in the administration panel of PRO-7070 Hazir Profesyonel Web Sitesi 1.0. By using the username '=' 'or' and password '=' 'or', the attacker can gain unauthorized access to the panel.

Integard Pro NoJs 2.2.0.9026 – Remote Buffer Overflow

Integard fails to sanitize input to the 'NoJs' parameter in an HTTP POST request, resulting in a stack buffer overflow that overwrites the instruction pointer, leading to remote code execution.

Adult Script – Remote Sql Injection

The exploit allows an attacker to perform remote SQL injection on the Adult Script website. By manipulating the 'id' parameter in the 'videolink_count.php' and 'links.php' pages, the attacker can retrieve sensitive information such as the admin username, password, and email. The exploit has been tested on the official demo site of Adult Script and has been found to work effectively.

Amiti Antivirus 25.0.640 – Unquoted Service Path

The Amiti Antivirus software version 25.0.640 is vulnerable to an unquoted service path vulnerability. This vulnerability allows an attacker to escalate privileges by exploiting the way the service binary path is set. By placing a malicious executable in a specific location, an attacker can execute arbitrary code with elevated privileges.

Recent Exploits: