header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla Component NeoRecruit <= 1.4 (id) Remote Blind SQL Injection Vulnerability

The Joomla Component NeoRecruit version 1.4 and below is vulnerable to a remote blind SQL injection vulnerability. An attacker can exploit this vulnerability by injecting SQL code into the 'id' parameter of the 'offer_view' task in the 'com_neorecruit' component. This can lead to unauthorized access to the database, potentially exposing sensitive information.

Polycom Command Shell Authorization Bypass

The login component of the Polycom Command Shell on Polycom HDX video endpoints, running software versions 3.0.5 and earlier, is vulnerable to an authorization bypass when simultaneous connections are made to the service, allowing remote network attackers to gain access to a sandboxed telnet prompt without authentication. Versions prior to 3.0.4 contain OS command injection in the ping command which can be used to execute arbitrary commands as root.

Unitrends UEB 9 http api/storage remote root

It was discovered that the api/storage web interface in Unitrends Backup (UB) before 10.0.0 has an issue in which one of its input parameters was not validated. A remote attacker could use this flaw to bypass authentication and execute arbitrary commands with root privilege on the target system.

CometChat < v6.2.0 BETA 1 - Local File Inclusion

In versions of CometChat before version v6.2.0 BETA 1, a bug existed which allowed any unauthorized attacker to modify the include path of a PHP file by sending an HTTP request with a crafted 'cc_lang' cookie. If successfully exploited, an attacker could leverage this bug to execute arbitrary PHP code which resides somewhere else on the server (e.g., uploaded via an upload form).

WR940N Authenticated Remote Code Exploit

This exploit opens a bind shell on the remote target. It requires authentication. The default credentials are admin:admin. The exploit generates an authorization cookie using the user's password and sends it in the request header. The server generates a random path for further requests. The exploit also includes custom bind shell shellcode with a simple XOR encoder.

MS-WINDOWS-GAME-DEFINITION-FILE-MAKER-v6.3.9600-XML-EXTERNAL-ENTITY

If a user loads an attacker supplied "GDFMakerProject" file type into GDF Maker using Ctrl+O or file menu, local files can be exfiltrated to remote attacker controlled server, as gdfmaker.exe is vulnerable to XML External Entity Expansion attacks.

Recent Exploits: