header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Verizon 4G LTE Network Extender – Weak Credentials Algorithm

Verizon's 4G LTE Network Extender is utilizing a weak default admin password generation algorithm. The password is generated using the last 4 values from the device's MAC address, which is disclosed on the main webUI login page to an unauthenticated attacker. The values are then concatenated with the string 'LTEFemto' resulting in something like 'LTEFemtoD080' as the default Admin password.

Microsoft DirectSpeechSynthesis Module Remote Buffer Overflow Exploit

This exploit targets the DirectSpeechSynthesis Module (XVoice.dll) version 4.0.4.3303. It allows for remote execution of arbitrary code by exploiting a buffer overflow vulnerability. The exploit is designed specifically for Internet Explorer 7 on Windows XP SP2 and utilizes a heap spray technique.

Microsoft Exchange Active Directory Topology 15.0.847.40 – ‘Service MSExchangeADTopology’ Unquoted Service Path

The Microsoft Exchange Active Directory Topology service in version 15.0.847.40 is vulnerable to an unquoted service path vulnerability. An attacker with local access to the system can exploit this vulnerability to escalate privileges and execute arbitrary code.

Microsoft Exchange Mailbox Assistants 15.0.847.40 – ‘Service MSExchangeMailboxAssistants’ Unquoted Service Path

The Microsoft Exchange Mailbox Assistants service (MSExchangeMailboxAssistants) in version 15.0.847.40 has an unquoted service path vulnerability, which allows an attacker to potentially escalate privileges on the system.

Franklin Fueling Systems Colibri Controller Module 1.8.19.8580 – Local File Inclusion (LFI)

The Franklin Fueling Systems Colibri Controller Module version 1.8.19.8580 is vulnerable to a local file inclusion (LFI) vulnerability. An attacker can exploit this vulnerability to read arbitrary files on the target system.

ProtonVPN 1.26.0 – Unquoted Service Path

The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path. If a malicious individual has access to the file system, it is possible to elevate privileges by inserting such a file as "C:Program.exe" to be run by a privileged program making use of WinExec.

Recent Exploits: