Exploitdb Exploits

50,135 exploits tracked across all sources.

Sort: Activity Stars
CVE-2022-50929 EXPLOITDB HIGH text
Connectify Hotspot 2018 - Code Injection
Connectify Hotspot 2018 contains an unquoted service path vulnerability in its ConnectifyService executable that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in 'C:\Program Files (x86)\Connectify\ConnectifyService.exe' to inject malicious executables and escalate privileges.
by SamAlucard
CVSS 8.4
CVE-2022-50928 EXPLOITDB HIGH text
BlueSoleilCS 5.4.277 - Code Injection
BlueSoleilCS 5.4.277 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted binary path in 'C:\Program Files\IVT Corporation\BlueSoleil\BlueSoleilCS.exe' to inject malicious executables and escalate privileges.
by SamAlucard
CVSS 7.8
CVE-2022-50904 EXPLOITDB HIGH text
Wondershare UBackit 2.0.5 - Code Injection
Wondershare UBackit 2.0.5 contains an unquoted service path vulnerability that allows local users to potentially execute arbitrary code with elevated system privileges. Attackers can exploit the unquoted path in the wsbackup service to inject malicious executables that would run with LocalSystem permissions during service startup.
by Luis Martínez
CVSS 8.4
CVE-2022-50903 EXPLOITDB HIGH text
Wondershare MobileTrans 3.5.9 - Privilege Escalation
Wondershare MobileTrans 3.5.9 contains an unquoted service path vulnerability in the ElevationService that allows local users to potentially execute code with elevated system privileges. Attackers can exploit the unquoted path by placing malicious executables in specific filesystem locations that will be executed with LocalSystem permissions during service startup.
by Luis Martínez
CVSS 8.4
CVE-2022-50902 EXPLOITDB HIGH text
Wondershare FamiSafe 1.0 - Code Injection
Wondershare FamiSafe 1.0 contains an unquoted service path vulnerability in the FSService that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in C:\Program Files (x86)\Wondershare\FamiSafe\ to inject malicious code that would run with LocalSystem permissions during service startup.
by Luis Martínez
CVSS 8.4
CVE-2022-50901 EXPLOITDB HIGH text
Wondershare Dr.Fone 11.4.9 - Code Injection
Wondershare Dr.Fone 11.4.9 contains an unquoted service path vulnerability in the DFWSIDService that allows local users to potentially execute arbitrary code. Attackers can exploit the unquoted path in C:\Program Files (x86)\Wondershare\Wondershare Dr.Fone\ to inject malicious executables that would run with LocalSystem privileges.
by Luis Martínez
CVSS 8.4
EIP-2026-118017 EXPLOITDB text
TOSHIBA DVD PLAYER Navi Support Service - 'TNaviSrv' Unquoted Service Path
by SamAlucard
EIP-2026-117326 EXPLOITDB text
Intel(R) Management Engine Components 6.0.0.1189 - 'LMS' Unquoted Service Path
by SamAlucard
EIP-2026-117163 EXPLOITDB text
File Sanitizer for HP ProtectTools 5.0.1.3 - 'HPFSService' Unquoted Service Path
by SamAlucard
CVE-2022-0441 EXPLOITDB CRITICAL text
MasterStudy LMS <2.7.6 - Info Disclosure
The MasterStudy LMS WordPress plugin before 2.7.6 does to validate some parameters given when registering a new account, allowing unauthenticated users to register as an admin
by numan türle
CVSS 9.8
EIP-2026-113703 EXPLOITDB python
WordPress Plugin dzs-zoomsounds 6.60 - Remote Code Execution (RCE) (Unauthenticated)
by Overthinker1877
CVE-2022-22909 EXPLOITDB HIGH python
Digitaldruid Hoteldruid - Code Injection
HotelDruid v3.0.3 was discovered to contain a remote code execution (RCE) vulnerability which is exploited via an attacker inserting a crafted payload into the name field under the Create New Room module.
by 0z09e
CVSS 8.8
CVE-2021-43062 EXPLOITDB MEDIUM text
Fortinet FortiMail <7.0.1 - XSS
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiMail version 7.0.1 and 7.0.0, version 6.4.5 and below, version 6.3.7 and below, version 6.0.11 and below allows attacker to execute unauthorized code or commands via crafted HTTP GET requests to the FortiGuard URI protection service.
by Braiant Giraldo Villa
CVSS 6.1
CVE-2022-50931 EXPLOITDB HIGH text
TeamSpeak 3.5.6 - Local Privilege Escalation
TeamSpeak 3.5.6 contains an insecure file permissions vulnerability that allows local attackers to replace executable files with malicious binaries. Attackers can replace system executables like ts3client_win32.exe with custom files to potentially gain SYSTEM or Administrator-level access.
by Aryan Chehreghani
CVSS 7.8
CVE-2022-50930 EXPLOITDB HIGH text
Emerson PAC Machine Edition 9.80 - Privilege Escalation
Emerson PAC Machine Edition 9.80 contains an unquoted service path vulnerability in the TrapiServer service that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in the service configuration to inject malicious code that would execute with LocalSystem permissions during service startup.
by Luis Martínez
CVSS 8.4
CVE-2022-50800 EXPLOITDB HIGH text
H3C SSL VPN - Info Disclosure
H3C SSL VPN contains a user enumeration vulnerability that allows attackers to identify valid usernames through the 'txtUsrName' POST parameter. Attackers can submit different usernames to the login_submit.cgi endpoint and analyze response messages to distinguish between existing and non-existing accounts.
by LiquidWorm
CVSS 7.5
CVE-2022-26633 EXPLOITDB CRITICAL text
Simple Student Quarterly Result/Grade System v1.0 - SQL Injection
Simple Student Quarterly Result/Grade System v1.0 was discovered to contain a SQL injection vulnerability via /sqgs/Actions.php.
by Saud Alenazi
CVSS 9.8
CVE-2022-26632 EXPLOITDB CRITICAL text VERIFIED
Multi-Vendor Online Groceries Management System v1.0 - SQL Injection
Multi-Vendor Online Groceries Management System v1.0 was discovered to contain a blind SQL injection vulnerability via the id parameter in /products/view_product.php.
by Saud Alenazi
CVSS 9.8
CVE-2021-24966 EXPLOITDB MEDIUM text
Error Log Viewer <1.1.1 - Privilege Escalation
The Error Log Viewer WordPress plugin through 1.1.1 does not validate the path of the log file to clear, allowing high privilege users to clear arbitrary files on the web server, including those outside of the blog folder
by Ceylan BOZOĞULLARINDAN
CVSS 4.9
CVE-2021-45901 EXPLOITDB MEDIUM python
ServiceNow Orlando - Info Disclosure
The password-reset form in ServiceNow Orlando provides different responses to invalid authentication attempts depending on whether the username exists.
by Victor Hanna
CVSS 5.3
EIP-2026-101895 EXPLOITDB text
Network Video Recorder NVR304-16EP - Reflected Cross-Site Scripting (XSS) (Unauthenticated)
by Luis Martínez
CVE-2022-50932 EXPLOITDB HIGH text
Kyocera Command Center RX ECOSYS M2035dn - Path Traversal
Kyocera Command Center RX ECOSYS M2035dn contains a directory traversal vulnerability that allows unauthenticated attackers to read sensitive system files by manipulating file paths under the /js/ path. Attackers can exploit the issue by sending requests like /js/../../../../.../etc/passwd%00.jpg (null-byte appended traversal) to access critical files such as /etc/passwd and /etc/shadow.
by Luis Martínez
CVSS 7.5
EIP-2026-112467 EXPLOITDB text
Subrion CMS 4.2.1 - Cross Site Request Forgery (CSRF) (Add Amin)
by Aryan Chehreghani
EIP-2026-104904 EXPLOITDB text
Accounting Journal Management System 1.0 - 'id' SQLi (Authenticated)
by Alperen Ergel
CVE-2022-50933 EXPLOITDB HIGH text
Cain & Abel 4.9.56 - Code Injection
Cain & Abel 4.9.56 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code with elevated privileges. Attackers can exploit the unquoted binary path to inject malicious executables that will be launched with LocalSystem permissions.
by Aryan Chehreghani
CVSS 7.8