header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Internet Download Accelerator idaiehlp.dll Remote Buffer Overflow Vulnerability

This exploit targets a vulnerability in the idaiehlp.dll file of Internet Download Accelerator. By sending a specially crafted string as an argument to the NotSafe method of the idaiehlp object, an attacker can trigger a buffer overflow and potentially execute arbitrary code on the target system.

PHP Real Estate Classifieds Premium Plus(header.php) Remote File Inclusion Exploit

This is a remote file inclusion exploit in the PHP Real Estate Classifieds Premium Plus script. It allows an attacker to include arbitrary files from a remote server, potentially leading to remote code execution.

e-Vision CMS SQL Injection/Remote Code Execution Exploit

The e-Vision CMS <= 2.02 has multiple vulnerabilities including SQL Injection and Remote Code Execution. The SQL Injection vulnerability can allow an attacker to retrieve the admin user and hash, while the Remote Code Execution vulnerability allows an attacker to execute arbitrary commands on the target system.

NETGATE Registry Cleaner Unquoted Service Path Privilege Escalation

NETGATE Registry Cleaner installs a service with an unquoted service path. To properly exploit this vulnerability, the local attacker must insert an executable file in the path of the service. Upon service restart or system reboot, the malicious code will be run with elevated privileges.

NetBilletterie 2.8 | Multiple Vulnerabilities

The NetBilletterie 2.8 software is vulnerable to multiple SQL Injection attacks. These include time-based blind SQL Injection and boolean-based blind SQL Injection. An attacker can exploit these vulnerabilities to execute arbitrary SQL commands and potentially gain unauthorized access to the database.

MoviePlay 4.76 .lst file Local buffer over-flow

MoviePlay is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer. Exploiting this vulnerability allows attackers to execute arbitrary machine code in the context of the affected application. The exploit consists of 1053 bytes of buffer, followed by 4 bytes for the return address, 351 bytes of shell code, and 592 bytes of buffer. The file size is 2000 bytes.

Recent Exploits: