Category: CVSS2 - HIGH
CVE-2023-38025

SpotCam Co., Ltd. SpotCam FHD 2’s hidden Telnet function has a vulnerability of OS command injection. An remote unauthenticated attacker can exploit this vulnerability to execute command injectio ...

Continue Reading
CVE-2023-38026

SpotCam Co., Ltd. SpotCam FHD 2 has a vulnerability of using hard-coded uBoot credentials. An remote attacker can exploit this vulnerability to access the system to perform arbitrary system operations ...

Continue Reading
CVE-2023-38027

SpotCam Co., Ltd. SpotCam Sense’s hidden Telnet function has a vulnerability of OS command injection. An remote unauthenticated attacker can exploit this vulnerability to execute command injectio ...

Continue Reading
CVE-2023-39846

An issue in Konga v0.14.9 allows attackers to bypass authentication via a crafted JWT token.Read More ...

Continue Reading
Metasploit Weekly Wrap-Up

## Power[shell]Point ![Metasploit Weekly Wrap-Up](https://blog.rapid7.com/content/images/2023/08/metasploit-ascii-1-2-1.png) This week’s new features and improvements start with two new exploit m ...

Continue Reading
CVE-2023-32757

e-Excellence U-Office Force file uploading function does not restrict upload of file with dangerous type. An unauthenticated remote attacker without logging the service can exploit this vulnerability ...

Continue Reading
Exploit for Command Injection in Raspap

# RaspAP Hunter RaspAP Hunter is a Bash script designed to scan...Read More ...

Continue Reading
Chamilo 1.11.18 Command Injection Exploit

This Metasploit module exploits an unauthenticated remote command execution vulnerability that affects Chamilo versions 1.11.18 and below. Due to a functionality called Chamilo Rapid to easily convert ...

Continue Reading
Chamilo unauthenticated command injection in PowerPoint upload

Chamilo is an e-learning platform, also called Learning Management Systems (LMS). This module exploits an unauthenticated remote command execution vulnerability that affects Chamilo versions `1.11.18` ...

Continue Reading
Qualys Tackles 2022’s Top Routinely Exploited Cyber Vulnerabilities

A unified front against malicious cyber actors is climactic in the ever-evolving cybersecurity landscape. The joint Cybersecurity Advisory (CSA), a collaboration between leading cybersecurity agencies ...

Continue Reading
Load more