header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

IPUX CL5452/CL5132 IP Camera (UltraSVCamX.ocx) ActiveX Stack Buffer Overflow

The UltraSVCam ActiveX Control 'UltraSVCamX.ocx' suffers from a stack buffer overflow vulnerability when parsing large amount of bytes to several functions in UltraSVCamLib, resulting in memory corruption overwriting several registers including the SEH. An attacker can gain access to the system of the affected node and execute arbitrary code.

IPUX Cube Type CS303C IP Camera (UltraMJCamX.ocx) ActiveX Stack Buffer Overflow

The UltraMJCam ActiveX Control 'UltraMJCamX.ocx' suffers from a stack buffer overflow vulnerability when parsing large amount of bytes to several functions in UltraMJCamLib, resulting in memory corruption overwriting several registers including the SEH. An attacker can gain access to the system of the affected node and execute arbitrary code.

Prolink PRN2001 Multiple Vulnerabilities

Insufficient separation of privileges. Any account with user-level privileges has the following privileges in the web interface: Access to the device's configuration, Access to the device's log files, Access to the device's firmware.

WordPress <= v4.0 Denial of Service Vulnerability

A denial of service vulnerability exists in WordPress versions prior to 4.0. An attacker can send a large number of POST requests with a large username and password to the wp-login.php page, which will cause the server to become unresponsive. This can be done by using the proof-of-concept code developed by john@secureli.com.

Multiple Vulnerability xEpan 1.0.4

xEpan have elfinder which can exploited to upload a backdoor. Vulnerable page is http://target/elfinder/elfinder.html. Just upload your php backdoor and acess there http://target/elfinder/files/<backdoor_name>. Database information can be leaked from http://target/install.sql. Important file, like ftp password, is stored in a public file http://target/ftpsync.settings. Weak password used is http://target/index.php?page=owner_dashboard with admin:admin.

Slider Revolution/Showbiz Pro shell upload exploit

Slider Revolution and Showbiz Pro fail to check authentication in revslider_admin.php/showbiz_admin.php allowing an unauthenticated attacker to abuse administrative features. Some of the features include: Creating/Deleting/Updating sliders, Importing/exporting sliders, Updading plugin.

Cross-Site Request Forgery (CSRF) in xEpan

The vulnerability exists due to insufficient validation of the HTTP request origin when creating new user accounts. A remote unauthenticated attacker can trick a logged-in administrator to visit a malicious page with CSRF exploit, create new account with administrative privileges and get total control over the vulnerable website.

Recent Exploits: