header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

TOSHIBA DVD PLAYER Navi Support Service – ‘TNaviSrv’ Unquoted Service Path

The TOSHIBA DVD PLAYER Navi Support Service (TNaviSrv) is vulnerable to an unquoted service path vulnerability. This vulnerability allows an attacker to gain elevated privileges on the system by placing malicious files in the same directory as the TNaviSrv.exe service executable.

Fortinet Fortimail 7.0.1 – Reflected Cross-Site Scripting (XSS)

An improper neutralization of input during web page generation vulnerability ('Cross-site Scripting') [CWE-79] in FortiMail may allow an unauthenticated attacker to perform an XSS attack via crafted HTTP GET requests to the FortiGuard URI protection service.

Wondershare UBackit 2.0.5 – ‘wsbackup’ Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Wondershare FamiSafe 1.0 – ‘FSService’ Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Wondershare MobileTrans 3.5.9 – ‘ElevationService’ Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Wondershare Dr.Fone 11.4.9 – ‘DFWSIDService’ Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Hotel Druid 3.0.3 – Remote Code Execution (RCE)

Hotel Druid 3.0.3 is vulnerable to Remote Code Execution (RCE) due to improper input validation. An attacker can exploit this vulnerability by sending a malicious payload to the target application. This payload will be executed on the server side and can be used to gain access to the system. The exploit is achieved by sending a specially crafted POST request to the target application with the malicious payload in the 'n_app' parameter. The payload is then executed on the server side and the attacker can gain access to the system.

WordPress Plugin dzs-zoomsounds – Remote Code Execution (RCE) (Unauthenticated)

A vulnerability in the WordPress Plugin dzs-zoomsounds allows an unauthenticated attacker to execute arbitrary code on the vulnerable system. This is achieved by sending a malicious POST request to the savepng.php file, which contains a base64 encoded payload. The payload creates a file in the exploited folder, which can be used to execute arbitrary code on the vulnerable system.

Recent Exploits: