header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla Component RSfiles <= 1.0.2 (path) Remote File Download Vulnerability

The Joomla Component RSfiles version 1.0.2 and below is vulnerable to remote file download. An attacker can exploit this vulnerability by sending a specially crafted request to the target server. This allows the attacker to download files from the server.

Smart Development Bridge <=2.3.2 (part of Tizen Studio 1.3 Windows x86/x64) - Buffer Overflow PoC

This code has been created for educational purposes only, to raise awareness on software security, and it's harmless by intention (the PoC runs calc.exe). Please do not change the code behaviour to malicious

Watchdog Development Anti-Malware/Online Security Pro Null Pointer Dereference

A null pointer dereference vulnerability is triggered when sending an operation to ioctls 0x80002010 or 0x80002054. This is due to input buffer being NULL or the input buffer size being 0 as they are not validated.

Joomla Component NeoRecruit <= 1.4 (id) Remote Blind SQL Injection Vulnerability

The Joomla Component NeoRecruit version 1.4 and below is vulnerable to a remote blind SQL injection vulnerability. An attacker can exploit this vulnerability by injecting SQL code into the 'id' parameter of the 'offer_view' task in the 'com_neorecruit' component. This can lead to unauthorized access to the database, potentially exposing sensitive information.

Polycom Command Shell Authorization Bypass

The login component of the Polycom Command Shell on Polycom HDX video endpoints, running software versions 3.0.5 and earlier, is vulnerable to an authorization bypass when simultaneous connections are made to the service, allowing remote network attackers to gain access to a sandboxed telnet prompt without authentication. Versions prior to 3.0.4 contain OS command injection in the ping command which can be used to execute arbitrary commands as root.

Unitrends UEB 9 http api/storage remote root

It was discovered that the api/storage web interface in Unitrends Backup (UB) before 10.0.0 has an issue in which one of its input parameters was not validated. A remote attacker could use this flaw to bypass authentication and execute arbitrary commands with root privilege on the target system.

Recent Exploits: