header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Toshiba Surveillance (Surveillix) RecordSend Class (MeIpCamX.DLL 1.0.0.4) remote buffer overflow exploit (IE7/xpsp2)

The Toshiba Surveillance (Surveillix) RecordSend Class (MeIpCamX.DLL 1.0.0.4) is vulnerable to a remote buffer overflow exploit in IE7/xpsp2. This vulnerability can be exploited by an attacker to execute arbitrary code or crash the affected system.

Online Movie Streaming 1.0 – Admin Authentication Bypass

The exploit allows an attacker to bypass the authentication mechanism in the Online Movie Streaming 1.0 application. By manipulating the login form parameters, an attacker can gain administrative access to the application.

PortableKanban 4.3.6578.38136 – Encrypted Password Retrieval

PortableKanBan stores credentials in an encrypted format. Reverse engineering the executable allows an attacker to extract credentials from local storage. Provide this program with the path to a valid PortableKanban.pk3 file and it will extract the decoded credentials.

Cemetry Mapping and Information System 1.0 – Multiple Stored Cross-Site Scripting

The Cemetry Mapping and Information System 1.0 is affected by multiple stored cross-site scripting vulnerabilities. The vulnerabilities allow an attacker to inject malicious scripts into the 'Full Name' and 'Location' parameters, potentially leading to the execution of arbitrary code or the theft of sensitive information.

WordPress wpDiscuz Unauthen File Upload Vulnerability

This module exploits an arbitrary file upload in the WordPress wpDiscuz plugin version 7.0.4. This flaw gave unauthenticated attackers the ability to upload arbitrary files, including PHP files, and achieve remote code execution on a vulnerable site’s server.

Online Doctor Appointment System 1.0 – ‘Multiple’ Stored XSS

The exploit allows an attacker to inject malicious script code into the 'First Name', 'Last Name', and 'Address' fields during the profile update process. This results in the execution of the payload each time a new page is visited or the profile is updated.

Recent Exploits: