header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Easy WMV/ASF/ASX to DVD Burner 2.3.11 – ‘Enter User Name’ Field Buffer Overflow (SEH)

This exploit takes advantage of a buffer overflow vulnerability in the 'Enter User Name' field of Easy WMV/ASF/ASX to DVD Burner version 2.3.11. By pasting specific content into this field, an attacker can trigger the overflow and potentially execute arbitrary code.

Envolution <= v1.1.0 Remote SQL Injection

This perl script exploits a remote SQL injection vulnerability in Envolution <= v1.1.0. It allows an attacker to retrieve the username and password (md5) of a specific member using their member id. The vulnerability is due to improper input validation in the 'modules.php' file. By crafting a malicious request, an attacker can inject SQL code and retrieve sensitive information from the database.

Disk Savvy Enterprise 9.9.14 Remote SEH Buffer Overflow

This exploit takes advantage of a buffer overflow vulnerability in Disk Savvy Enterprise version 9.9.14. By sending a specially crafted request to the server, an attacker can trigger a stack-based buffer overflow, overwriting the Structured Exception Handler (SEH) and gaining control of the program execution flow. This allows the attacker to execute arbitrary code on the target system.

MP3 WAV to CD Burner 1.4.24 – ‘Enter User Name’ Field Buffer Overflow (SEH)

The 'Enter User Name' field in MP3 WAV to CD Burner version 1.4.24 is vulnerable to a buffer overflow attack. This can be exploited by pasting a large amount of data into the field, causing the program to crash or potentially execute arbitrary code.

My Video Converter 1.5.24 – ‘Enter User Name’ Field Buffer Overflow (SEH)

This exploit targets the 'Enter User Name' field in My Video Converter 1.5.24. By entering a specially crafted string, it triggers a buffer overflow vulnerability, corrupting the Structured Exception Handler (SEH) chain. This can potentially allow an attacker to execute arbitrary code.

CHILKAT ASP String (CkString.dll <= 1.1) "SaveToFile()" Insecure Method

This exploit targets the 'SaveToFile()' method in the CHILKAT ASP String (CkString.dll) component, version 1.1 and below. It allows an attacker to execute arbitrary commands on the system, potentially leading to remote code execution. The vulnerability exists in all software that uses this component. The exploit takes advantage of the insecure method to create a malicious batch file ('shinnai.bat') and execute it using 'cmd.exe'.

Easy AVI DivX Converter 1.2.24 – ‘Enter User Name’ Field Buffer Overflow (SEH)

This exploit takes advantage of a buffer overflow vulnerability in the 'Enter User Name' field of Easy AVI DivX Converter 1.2.24. By providing a specially crafted input, an attacker can overwrite the SEH (Structured Exception Handler) and gain control of the program's execution flow. This exploit has been tested on Windows 7 x64.

Recent Exploits: