Exploitdb Exploits

459 exploits tracked across all sources.

Sort: Newest Stars
CVE-2020-9496 EXPLOITDB MEDIUM bash
Apache Ofbiz - Insecure Deserialization
XML-RPC request are vulnerable to unsafe deserialization and Cross-Site Scripting issues in Apache OFBiz 17.12.03
by Adrián Díaz
CVSS 6.1
CVE-2021-3560 EXPLOITDB HIGH bash VERIFIED
polkit - Privilege Escalation
It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
by J Smith
CVSS 7.8
CVE-2020-24186 EXPLOITDB CRITICAL bash
gVectors wpDiscuz <7.0.4 - RCE
A Remote Code Execution vulnerability exists in the gVectors wpDiscuz plugin 7.0 through 7.0.4 for WordPress, which allows unauthenticated users to upload any type of file, including PHP files via the wmuUploadFiles AJAX action.
by UnD3sc0n0c1d0
CVSS 10.0
EIP-2026-114234 EXPLOITDB bash
WordPress Plugin WP Statistics 13.0.7 - Time-Based Blind SQL Injection (Unauthenticated)
by Mansoor R
EIP-2026-114702 EXPLOITDB bash
GitLab Community Edition (CE) 13.10.3 - User Enumeration
by 4D0niiS
CVE-2020-29134 EXPLOITDB HIGH bash
Totvs Fluig - Path Traversal
The TOTVS Fluig platform allows path traversal through the parameter "file = .. /" encoded in base64. This affects all versions Fluig Lake 1.7.0, Fluig 1.6.5 and Fluig 1.6.4
by Lucas Souza
CVSS 8.6
CVE-2021-26822 EXPLOITDB CRITICAL bash
Phpgurukul Teachers Record Management System - SQL Injection
Teachers Record Management System 1.0 is affected by a SQL injection vulnerability in 'searchteacher' POST parameter in search-teacher.php. This vulnerability can be exploited by a remote unauthenticated attacker to leak sensitive information and perform code execution attacks.
by Soham Bakore
CVSS 9.8
CVE-2021-47728 EXPLOITDB CRITICAL bash
Selea Targa IP OCR-ANPR Camera - Command Injection
Selea Targa IP OCR-ANPR Camera contains an unauthenticated command injection vulnerability in utils.php that allows remote attackers to execute arbitrary shell commands. Attackers can exploit the 'addr' and 'port' parameters to inject commands and gain www-data user access through chained local file inclusion techniques.
by LiquidWorm
CVSS 9.8
EIP-2026-104245 EXPLOITDB bash
EyesOfNetwork 5.3 - File Upload Remote Code Execution
by Audencia Business SCHOOL Red Team
CVE-2020-11819 EXPLOITDB CRITICAL bash
Rukovoditel - Path Traversal
In Rukovoditel 2.5.2, an attacker may inject an arbitrary .php file location instead of a language file and thus achieve command execution.
by coiffeur
CVSS 9.8
CVE-2021-27289 EXPLOITDB CRITICAL bash
Ksix Zigbee Gateway Module <1.0.3, Door Sensor <1.0.7, Motion Senso...
A replay attack vulnerability was discovered in a Zigbee smart home kit manufactured by Ksix (Zigbee Gateway Module = v1.0.3, Door Sensor = v1.0.7, Motion Sensor = v1.0.12), where the Zigbee anti-replay mechanism - based on the frame counter field - is improperly implemented. As a result, an attacker within wireless range can resend captured packets with a higher sequence number, which the devices incorrectly accept as legitimate messages. This allows spoofed commands to be injected without authentication, triggering false alerts and misleading the user through notifications in the mobile application used to monitor the network.
by Alejandro Vazquez Vazquez
CVSS 9.1
CVE-2020-25213 EXPLOITDB CRITICAL bash
WordPress File Manager Unauthenticated Remote Code Execution
The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote attackers to upload and execute arbitrary PHP code because it renames an unsafe example elFinder connector file to have the .php extension. This, for example, allows attackers to run the elFinder upload (or mkfile and put) command to write PHP code into the wp-content/plugins/wp-file-manager/lib/files/ directory. This was exploited in the wild in August and September 2020.
by Mansoor R
CVSS 10.0
CVE-2020-5295 EXPLOITDB MEDIUM bash
OctoberCMS <1.0.466 - Info Disclosure
In OctoberCMS (october/october composer package) versions from 1.0.319 and before 1.0.466, an attacker can exploit this vulnerability to read local files of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the `cms.manage_assets` permission. Issue has been patched in Build 466 (v1.0.466).
by Sivanesh Ashok
CVSS 4.8
EIP-2026-114008 EXPLOITDB bash
WordPress Plugin Rest Google Maps < 7.11.18 - SQL Injection
by Jonatas Fil
CVE-2020-24214 EXPLOITDB CRITICAL bash
HiSilicon box - Buffer Overflow
An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. Attackers can send a crafted unauthenticated RTSP request to cause a buffer overflow and application crash. The device will not be able to perform its main purpose of video encoding and streaming for up to a minute, until it automatically reboots. Attackers can send malicious requests once a minute, effectively disabling the device.
by Alexei Kojenov
CVSS 9.8
CVE-2020-24219 EXPLOITDB HIGH bash
URayTech IPTV/H.264/H.265 <1.97 - Path Traversal
An issue was discovered on URayTech IPTV/H.264/H.265 video encoders through 1.97. Attackers can send crafted unauthenticated HTTP requests to exploit path traversal and pattern-matching programming flaws, and retrieve any file from the device's file system, including the configuration file with the cleartext administrative password.
by Alexei Kojenov
CVSS 7.5
CVE-2020-24217 EXPLOITDB CRITICAL bash
HiSilicon box - RCE
An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. The file-upload endpoint does not enforce authentication. Attackers can send an unauthenticated HTTP request to upload a custom firmware component, possibly in conjunction with command injection, to achieve arbitrary code execution.
by Alexei Kojenov
CVSS 9.8
CVE-2020-24217 EXPLOITDB CRITICAL bash
HiSilicon box - RCE
An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. The file-upload endpoint does not enforce authentication. Attackers can send an unauthenticated HTTP request to upload a custom firmware component, possibly in conjunction with command injection, to achieve arbitrary code execution.
by Alexei Kojenov
CVSS 9.8
CVE-2020-24215 EXPLOITDB CRITICAL bash
HiSilicon IPTV/H.264/H.265 - RCE
An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. Attackers can use hard-coded credentials in HTTP requests to perform any administrative task on the device including retrieving the device's configuration (with the cleartext admin password), and uploading a custom firmware update, to ultimately achieve arbitrary code execution.
by Alexei Kojenov
CVSS 9.8
CVE-2020-6862 EXPLOITDB MEDIUM bash
ZTE F6x2w Firmware - Information Disclosure
V6.0.10P2T2 and V6.0.10P2T5 of F6x2W product are impacted by Information leak vulnerability. Unauthorized users could log in directly to obtain page information without entering a verification code.
by Hritik Vijay
CVSS 5.3
CVE-2020-3187 EXPLOITDB CRITICAL bash
Cisco ASA/FTD - Path Traversal
A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and obtain read and delete access to sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of the HTTP URL. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences. An exploit could allow the attacker to view or delete arbitrary files on the targeted system. When the device is reloaded after exploitation of this vulnerability, any files that were deleted are restored. The attacker can only view and delete files within the web services file system. This file system is enabled when the affected device is configured with either WebVPN or AnyConnect features. This vulnerability can not be used to obtain access to ASA or FTD system files or underlying operating system (OS) files. Reloading the affected device will restore all files within the web services file system.
by 0xmmnbassel
CVSS 9.1
CVE-2019-20361 EXPLOITDB CRITICAL bash
Icegram Email Subscribers & Newsletters < 4.3.1 - SQL Injection
There was a flaw in the WordPress plugin, Email Subscribers & Newsletters before 4.3.1, that allowed SQL statements to be passed to the database in the hash parameter (a blind SQL injection vulnerability).
by KBA@SOGETI_ESEC
CVSS 9.8
CVE-2020-7115 EXPLOITDB CRITICAL bash
Arubanetworks Clearpass Policy Manager - Missing Authentication
The ClearPass Policy Manager web interface is affected by a vulnerability that leads to authentication bypass. Upon successful bypass an attacker could then execute an exploit that would allow to remote command execution in the underlying operating system. Resolution: Fixed in 6.7.13-HF, 6.8.5-HF, 6.8.6, 6.9.1 and higher.
by SpicyItalian
CVSS 9.8
CVE-2020-5902 EXPLOITDB CRITICAL bash
BIG-IP <15.2 - RCE
In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages.
by Critical Start
CVSS 9.8
CVE-2020-13379 EXPLOITDB HIGH bash
Grafana 3.0.1-7.0.1 - SSRF
The avatar feature in Grafana 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information about the network that Grafana is running on. Furthermore, passing invalid URL objects could be used for DOS'ing Grafana via SegFault.
by mostwanted002
CVSS 8.2