header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

NTP MON_GETLIST Query Amplification DDoS

A Network Time Protocol (NTP) Amplification attack is an emerging form of Distributed Denial of Service (DDoS) that relies on the use of publically accessible NTP servers to overwhelm a victim system with UDP traffic. The NTP service supports a monitoring service that allows administrators to query the server for traffic counts of connected clients. This information is provided via the β€œmonlist” command. The basic attack technique consists of an attacker sending a "get monlist" request to a vulnerable NTP server, with the source address spoofed to be the victim’s address.

WordPress cp-multi-view-calendar.1.1.7 [Unauthenticated SQL injection vulnerabilities]

Multiple SQL Injection vulnerabilities has been detected in the Wordpress cp-multi-view-calendar plugin in version 1.1.7. The vulnerability allows remote attackers to inject own sql commands to compromise the affected web-application and connected dbms. The SQL Injection vulnerabilities are located in the `edit.php` and `datafeed.php` files. Remote attackers are able to inject own sql commands to the vulnerable parameters value in these files GET/POST method request.

WordPress CP Image Store with Slideshow 1.0.5 [Arbitrary file download vulnerability]

A vulnerability has been detected in the WordPress CP Image Store with Slideshow plugin in version 1.0.5. The vulnerability allows remote attackers to download arbitrary files from the server. The Arbitrary file download vulnerability is located in the `cp-image-store.php` file. The web vulnerability can be exploited by remote attackers without privileged application user account and without required user interaction. Successful exploitation of the Arbitrary file download vulnerability results in application compromise.

Notepad++ – Crash

Create a .xml file with numerous 'A's (around 1000) in it and save as test.xml. Go to this directory in windows '/appdata/roaming/notepad++/themes/' and paste above test.xml file in this theme folder and restart notepad++. Now start notepad++ and in menu tab, go in settings and then select style configurator and now select test file in theme select option. Now hit 'save and close' button, it will crash with an error message.

Blueberry Express v5.9.x – SEH Buffer Overflow Vulnerability

A local SEH Buffer Overflow vulnerability has been discovered in the official Blueberry Express v5.9.0.3678 software. The vulnerability allows local attackers to compromise the system with elevated privileges. The vulnerability is located in the `bbflashback.exe` module with the vulnerable function `bbflashback.exe` when processing to execute the `bbflashback.exe` file with a long string buffer.

SQL Injection in easy2map wordpress plugin v1.24

The easy2map plugin for WordPress is vulnerable to a SQL injection vulnerability due to the lack of sanitization of user input when constructing SQL queries. An attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable plugin. This can allow an attacker to execute arbitrary SQL commands on the underlying database, potentially allowing them to gain access to sensitive data.

Persistent XSS Vulnerability in Orchard CMS

A persistent XSS vulnerability was discovered in the Users module that is distributed with the core distribution of the CMS. The issue potentially allows elevation of privileges by tricking an administrator to execute some custom crafted script on his behalf. The issue affects the Username field, since a user is allowed to register a username containing potentially dangerous characters.

AirLive Multiple Products OS Command Injection

AirLive MD-3025, BU-3026, BU-2015, WL-2000CAM and POE-200CAM are IP cameras designed for professional surveillance and security applications. The built-in IR LEDs provide high quality nighttime monitoring. These AirLive devices are vulnerable to an OS Command Injection Vulnerability. In the case of the MD-3025, BU-3026 and BU-2015 cameras, the vulnerability lies in the cgi_test.cgi binary file. In the case of the WL-2000CAM and POE-200CAM cameras, the command injection can be performed using the vulnerable wireless_mft.cgi binary file.

Recent Exploits: