header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Dup Scout Enterprise 10.0.18 – ‘sid’ Remote Buffer Overflow (SEH)

The 'sid' parameter in Dup Scout Enterprise 10.0.18 is vulnerable to a remote buffer overflow. By sending a specially crafted request to the server, an attacker can overflow the buffer and potentially execute arbitrary code on the target system.

Microsoft GamingServices 2.47.10001.0 – ‘GamingServices’ Unquoted Service Path

The Microsoft GamingServices version 2.47.10001.0 is vulnerable to an unquoted service path vulnerability. This vulnerability allows an attacker to gain escalated privileges by placing a malicious executable in a directory with a space in its name, which is not properly quoted in the service's path. This can lead to the execution of arbitrary code with elevated privileges.

Invision Community 4.5.4 – ‘Field Name’ Stored Cross-Site Scripting

The vulnerability exists in the 'Field Name' parameter of the Invision Community admin page. By injecting a malicious payload into the 'Field Name' parameter, an attacker can trigger a cross-site scripting (XSS) attack.

mojoPortal forums 2.7.0.0 – ‘Title’ Persistent Cross-Site Scripting

This vulnerability allows an attacker to inject XSS payload in the 'Title' field of the Add Forum section. When an admin visits the View Detail of the Forum section from the admin panel, the XSS payload triggers and the attacker can steal the cookie with the crafted payload.

RTS Sentry Digital Surveillance PTZCamPanel Class (CamPanel.dll 2.1.0.2) remote buffer overflow exploit (ie7/xp sp2)

This exploit targets the PTZCamPanelCtrl object class in the CamPanel.dll version 2.1.0.2 of RTS Sentry Digital Surveillance. It allows for remote buffer overflow, specifically on Internet Explorer 7 running on Windows XP SP2. The exploit can be accessed through the following camera demo: http://www.rtssentry.com/index.asp?PageAction=Custom&ID=10.

Recent Exploits: