header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Arcadem Remote File Inclusion Flaw / SQL Injection

It is possible for a remote attacker to include a file from local or remote resources and/or execute arbitrary script code with the privileges of the webserver. An attacker may execute arbitrary SQL statements on the vulnerable system. This may compromise the integrity of your database and/or expose sensitive information.

NVR SP2 2.0 nvUtility.Utility.1 (nvUtility.dll v. 1.0.14.0) ‘DeleteXMLFile()’ Insecure Method

This exploit targets the 'DeleteXMLFile()' method in the NVR SP2 2.0 nvUtility.Utility.1 control. It allows an attacker to delete arbitrary files on the system. All software that uses this control is vulnerable to this exploit.

Claymore’s Dual ETH + DCR/SC/LBC/PASC GPU Miner Remote Management Command Execution

The Claymore's Dual ETH + DCR/SC/LBC/PASC GPU Miner version 10.0 allows remote attackers to execute arbitrary commands via a crafted miner_getstat1 command to the remote management interface on port 3333.

Windows Defender: Controlled Folder Bypass through UNC Path

You can bypass the controlled folder feature in Defender in Windows 10 1709 using a local UNC admin share. By opening the target file for write/delete access through the UNC path, the controlled folders feature can be circumvented.

Recent Exploits: