header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Internet Explorer ver 7.0.5730.13 Buffer Overflow

This exploit is a buffer overflow vulnerability in the idaiehlp.dll BHO (Browser Helper Object) for Internet Download Accelerator. The vulnerability is triggered when a maliciously crafted argument is passed to the NotSafe() method of the idaiehlp.dll BHO. This can lead to arbitrary code execution on the vulnerable system.

QQPlayer 2.3.696.400p1(.wav) Denial of Service Vulnerability

QQPlayer 2.3.696.400p1 is vulnerable to a denial of service attack when a specially crafted .wav file is opened. The crafted file contains a header followed by a large number of 'A' characters. When the file is opened, the application will crash.

ColdGen – coldofficeview v2.04 Remote Blind SQL Injection vulnerabilities

ColdGen's coldofficeview v2.04 is vulnerable to Remote Blind SQL Injection. This vulnerability can be exploited by sending a maliciously crafted HTTP request to the vulnerable application. The PoC's provided demonstrate how an attacker can use the EventID and UserID parameters to inject malicious SQL code into the application.

ColdGen – coldbookmarks v1.22 Remote 0day SQL Injection vulnerability

ColdGen's coldbookmarks v1.22 is vulnerable to a remote SQL injection vulnerability. This vulnerability allows an attacker to inject arbitrary SQL code into the application. This can be exploited to gain access to the database and potentially gain access to sensitive information.

Novell Netware NWFTPD RMD/RNFR/DELE Argument Parsing Buffer overflow

A buffer overflow vulnerability exists in Novell Netware NWFTPD.NLM 5.09.02 (Netware 6.5 – SP8). A remote attacker can send a specially crafted DELE command with an overly long argument to trigger a stack-based buffer overflow and execute arbitrary code on the target system.

DynPage Multiple Remote Vulnerabilities

DynPage allows you to edit Websites online and make pieces of contents editable with a comfortable editor. DynPage implements the CKeditor - one of the best Internet editors. The integration of content into the HTML pages can be done with Ajax/Javascript or PHP - so you can also handle cross domain sites. DynPage is written in PHP and does not require MySQL database. It's easy to install and to configurate. Local File Disclosure vulnerability exists due to insufficient validation of user-supplied input in the 'file' parameter of '/content/dynpage_load.php' script. This can be exploited to disclose sensitive information from arbitrary files via a direct request. Admin hash Disclosure vulnerability exists due to the default password is admin,that stored in config_global.inc.php(line 41-42 ) and the hash password stored as SESSION in /conf/init.inc.php.

Joomla Component Aardvertiser 2.1 free Blind SQL Injection Vulnerability

A vulnerability exists in Joomla Component Aardvertiser 2.1 free, which allows an attacker to inject malicious SQL queries via the 'cat_name' parameter in the 'index.php' script. An attacker can exploit this vulnerability to gain access to sensitive information from the database.

Micronetsoft Rental Property Management Website SQLi

The Real Estate & Rental Property Website includes a web application that provide realtors with the ability to add both For Sale & For Rent properties to the web site using powerful forms that are easy to use and provides visitors with the ability to browse or search those properties. The web application's administration tool allows for easy updates of properties with image upload, category management, listing management, mailing list management, and much more. The vulnerability is demonstrated by the demo URL http://server/detail.asp?ad_ID=[sqli].

Recent Exploits: