header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Geovision Inc. IP Camera/Video/Access Control Multiple Remote Command Execution – Multiple Stack Overflow – Double free – Unauthorized Access

The Geovision Inc. IP Camera/Video/Access Control devices suffer from multiple vulnerabilities including remote command execution, stack overflow, double free, and unauthorized access. These vulnerabilities allow an attacker to execute arbitrary commands on the affected devices remotely without authentication.

Delikon BlackJumboDog FTP Server Buffer Overflow

This exploit takes advantage of a buffer overflow vulnerability in the Delikon BlackJumboDog FTP Server version 3.6.1. By sending a specially crafted payload to the server, an attacker can execute arbitrary code on the target system. The shellcode used in this exploit opens a port on 7777, allowing the attacker to upload and execute a malicious executable. The shellcode exits with ExitThread to prevent crashing the service.

dbPowerAmp Buffer Overflow

The dbPowerAmp Music Converter application and dbPowerAmp Player are prone to buffer overflow conditions. These issues affect current and earlier versions of the dbPowerAmp Player and Music Converter. The Music Converter application allocates a 215 byte buffer for the file name within the playlist. By opening a playlist with a long file name, it is possible to overflow this buffer and overwrite the EIP with arbitrary code.

Webace-Linkscript V1.3 Special Edition – Remote SQL Injection

The vulnerability exists in the 'rubrik.php' file of Webace-Linkscript V1.3 Special Edition. The 'id' parameter in the URL is not properly filtered, allowing users to manipulate SQL queries through their browser. An attacker can exploit this vulnerability to execute arbitrary SQL queries and potentially gain unauthorized access to the database.

OTSTurntables 1.00 Buffer Overflow 0days

The exploit uses a buffer overflow vulnerability in OTSTurntables 1.00 to execute arbitrary code. It overflows a buffer with a length of 277 characters, then overwrites the EIP (Extended Instruction Pointer) with the address of the 'jmp esp' instruction in shell32.dll on Windows XP SP0. It also contains a shellcode of 224 bytes. If the SEH (Structured Exception Handling) method is used, additional information is provided. The exploit was created by the author with the value 0x58.

MGC ALERT 2018-001

The Enterprise version of PyroBatchFTP is affected by a Local Buffer Overflow vulnerability. The application does not check bounds when reading the file that will execute the script, resulting in a classic Buffer Overflow overwriting SEH handler. To exploit the vulnerability, only a local script is needed to interact with the application.

PHPNuke-Clan <= v4.2.0 (mvcw_conver.php) Remote File Inclusion

The vulnerability exists in the $vwar_root parameter in the modules/vwar/convert/mvcw_conver.php file. An attacker can include remote files by manipulating the 'vwar_root' parameter. This can lead to remote code execution or information disclosure.

Recent Exploits: