header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Syncplify.me Server! 5.0.37 – ‘SMWebRestServicev5’ Unquoted Service Path

A successful attempt to exploit this vulnerability requires the attacker to insert an executable file into the service path undetected by the OS or some security application. When restarting the service or the system, the inserted executable will run with elevated privileges.

OKI sPSV Port Manager 1.0.41 – ‘sPSVOpLclSrv’ Unquoted Service Path

A successful attempt to exploit this vulnerability requires the attacker to insert an executable file into the service path undetected by the OS or some security application. When restarting the service or the system, the inserted executable will run with elevated privileges.

HP Display Assistant x64 Edition 3.20 – ‘DTSRVC’ Unquoted Service Path

A successful attempt to exploit this vulnerability requires the attacker to insert an executable file into the service path undetected by the OS or some security application. When restarting the service or the system, the inserted executable will run with elevated privileges.

Genexis Platinum-4410 P4410-V2-1.28 – Broken Access Control and CSRF

Platinum 4410 router from Genexis with hardware version V2.1 and software version P4410-V2-1.28 is vulnerable to Broken Access Control and CSRF. This vulnerability allows an attacker to remotely change the WIFI access point's password by sending a specially crafted link to the victim while they are connected to the vulnerable router's WiFi network.

iDS6 DSSPro Digital Signage System 6.2 – Cross-Site Request Forgery (CSRF)

The iDS6 DSSPro Digital Signage System 6.2 allows users to perform actions via HTTP requests without validity checks, leading to potential CSRF attacks. An attacker can exploit this vulnerability to perform actions with administrative privileges when a logged-in user visits a malicious website.

Local File Inclusion Processwire CMS 2.4.0

Local File Inclusion in Processwire CMS 2.4.0 allows to retrieve arbitrary files via the download parameter to index.php By providing a specially crafted path to the vulnerable parameter, a remote attacker can retrieve the contents of sensitive files on the local system.

Recent Exploits: