December 15, 2022Acronis TrueImage XPC Privilege Escalation

Acronis TrueImage versions 2019 update 1 through 2021 update 1 are vulnerable to privilege escalation. The com.acronis.trueimagehelper helper tool does not perform any validation on connecting clients, which gives arbitrary clients the ability to execute

December 15, 2022Syncovery For Linux Web-GUI Authenticated Remote Command Execution

This Metasploit module exploits an authenticated command injection vulnerability in the Web GUI of Syncovery File Sync and Backup Software for Linux. Successful exploitation results in remote code execution under the context of the root user. Syncovery al

December 14, 2022SAP@ Host Agent Privilege Escalation

SAP@ Host Agent suffers from a privilege escalation vulnerability.

December 14, 2022Ransom.Win64.AtomSilo MVID-2022-0666 Cryptography Logic Flaw

Ransom.Win64.AtomSilo malware suffers from a cryptography logic flaw.

December 14, 2022Backdoor.Win32.InCommander.17.b MVID-2022-0665 Hardcoded Credentials

Backdoor.Win32.InCommander.17.b malware suffers from a hardcoded credential vulnerability.

December 14, 2022Shoplazza 1.1 Cross Site Scripting

Shoplazza version 1.1 suffers from a persistent cross site scripting vulnerability.

December 12, 2022Judging Management System 1.0 Shell Upload

Judging Management System version 1.0 a remote shell upload vulnerability.

December 12, 2022Judging Management System 1.0 SQL Injection

Judging Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

December 12, 2022Trojan-Dropper.Win32.Decay.dxv (CyberGate 1.00.0) MVID-2022-0664 Insecure Proprietary Password Encryption

Trojan-Dropper.Win32.Decay.dxv (CyberGate 1.00.0) malware suffers from an insecure proprietary password encryption vulnerability.

December 10, 2022Spitfire CMS 1.0.475 PHP Object Injection

Spitfire CMS version 1.0.475 is prone to a PHP object injection vulnerability due to the unsafe use of unserialize() function. A potential attacker, authenticated, could exploit this vulnerability by sending specially crafted requests to the web applicati

Archives
Categories
  • All Exploits 4105
  • Remote Code Execution
  • SQL Injection
  • Command Injection
  • Local File Inclusion
  • Cross Site Scripting
  • Privilege Escalation
  • Denial Of Service
  • Authentication Bypass
  • Buffer Overflow