header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Prey 1.9.6 – “CronService” Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

TDM Digital Signage PC Player 4.1 – Insecure File Permissions

TDM Digital Signage Windows Player suffers from an elevation of privileges vulnerability which can be used by a simple authenticated user that can change the executable file with a binary of choice. The vulnerability exist due to the improper permissions, with the 'M' flag (Modify) or 'C' flag (Change) for 'Authenticated Users' group.

ReQuest Serious Play Media Player 3.0 – Directory Traversal File Disclosure Vulnerability

The device suffers from an unauthenticated file disclosure vulnerability when input passed through the 'file' parameter in tail.html and file.html script is not properly verified before being used to read web log files. This can be exploited to disclose contents of files from local resources.

StreamAudio ChainCast ProxyManager ccpm_0237.dll SEH Overwrite Exploit

This exploit targets the ccpm_0237.dll file in StreamAudio ChainCast ProxyManager. It overwrites the Structured Exception Handling (SEH) to gain control of the application. The exploit includes a shellcode that executes the 'calc.exe' command. The shellcode is limited to about 680 bytes. This exploit has been tested on Windows XP SP2 (fully patched) with English language and Internet Explorer 6. Credit goes to h.d.m. and the Metasploit crew for their contributions.

Point of Sales 1.0 – SQL Injection

The Point of Sales 1.0 software is vulnerable to SQL Injection. By manipulating the 'id' parameter in the 'edit_category.php' page, an attacker can inject malicious SQL queries and retrieve sensitive information from the database. The vulnerability allows unauthorized access to the database.

Stock Management System 1.0 – Persistent Cross-Site Scripting (Categories Name)

A persistent cross-site scripting vulnerability exists within the 'Categories Name' parameter in the edit brand function. This example allows a logged-in user to inject javascript code as a persistent XSS attack which is persistent on any page with the Categories Name value expected.

Recent Exploits: