This exploit targets a vulnerability in the idaiehlp.dll file of Internet Download Accelerator. By sending a specially crafted string as an argument to the NotSafe method of the idaiehlp object, an attacker can trigger a buffer overflow and potentially execute arbitrary code on the target system.
This is a remote file inclusion exploit in the PHP Real Estate Classifieds Premium Plus script. It allows an attacker to include arbitrary files from a remote server, potentially leading to remote code execution.
The vulnerability allows an attacker to bypass authentication in the Health Record System. By using a specific input, the attacker can log in with any username and password combination.
The e-Vision CMS <= 2.02 has multiple vulnerabilities including SQL Injection and Remote Code Execution. The SQL Injection vulnerability can allow an attacker to retrieve the admin user and hash, while the Remote Code Execution vulnerability allows an attacker to execute arbitrary commands on the target system.
NETGATE Registry Cleaner installs a service with an unquoted service path. To properly exploit this vulnerability, the local attacker must insert an executable file in the path of the service. Upon service restart or system reboot, the malicious code will be run with elevated privileges.
The exploit crashes Firefox 49.0.1 by sending a specially crafted request. It causes a denial of service by overwhelming the browser and making it unresponsive.
You can change admin's password with CSRF, if you know admin's username
This exploit allows an attacker to download and execute any file they like on the target system. It takes advantage of a code injection vulnerability in the HTML object tag.
The NetBilletterie 2.8 software is vulnerable to multiple SQL Injection attacks. These include time-based blind SQL Injection and boolean-based blind SQL Injection. An attacker can exploit these vulnerabilities to execute arbitrary SQL commands and potentially gain unauthorized access to the database.
MoviePlay is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer. Exploiting this vulnerability allows attackers to execute arbitrary machine code in the context of the affected application. The exploit consists of 1053 bytes of buffer, followed by 4 bytes for the return address, 351 bytes of shell code, and 592 bytes of buffer. The file size is 2000 bytes.