header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Alps Pointing-device Controller 8.1202.1711.04 – ‘ApHidMonitorService’ Unquoted Service Path

The Alps Pointing-device controller installs a service with an unquoted path which could be used as a local privilege escalation vulnerability. To exploit this vulnerability, an executable file could be placed in the path of the service and after rebooting the system or restarting the service the malicious code will be executed with elevated privileges.

Prima Access Control 2.3.35 – Arbitrary File Upload

This exploit allows an attacker to upload arbitrary files to the Prima Access Control software version 2.3.35. By sending a specially crafted POST request to the sysfcgi.fx endpoint, an attacker can upload a malicious Python script that can execute arbitrary commands on the target system.

Prima Access Control 2.3.35 – ‘HwName’ Persistent Cross-Site Scripting

This exploit allows an attacker to perform a persistent cross-site scripting attack in the 'HwName' parameter of the Prima Access Control software version 2.3.35. By injecting malicious script code, an attacker can execute arbitrary JavaScript code in the context of the victim's browser.

CBAS-Web 19.0.0 – Cross-Site Request Forgery (Add Super Admin)

This exploit allows an attacker to perform Cross-Site Request Forgery (CSRF) attack in CBAS-Web version 19.0.0. By tricking a user into visiting a malicious website, the attacker can add a super admin to the system without the user's knowledge or consent.

Recent Exploits: