September 22, 2022Multix 2.4 Cross Site Request Forgery

Multix version 2.4 suffers from a cross site request forgery vulnerability.

September 22, 2022Multix 2.4 Cross Site Scripting

Multix version 2.4 suffers from a cross site scripting vulnerability.

September 21, 2022Unified Remote Authentication Bypass / Code Execution

This Metasploit module utilizes the Unified Remote remote control protocol to type out and deploy a payload. The remote control protocol can be configured to have no passwords, a group password, or individual user accounts. If the web page is accessible,

September 21, 2022WiFiMouse 1.8.3.4 Remote Code Execution

WiFiMouse version 1.8.3.4 suffers from a remote code execution vulnerability.

September 20, 2022Backdoor.Win32.Hellza.120 MVID-2022-0641 Remote Command Execution

Backdoor.Win32.Hellza.120 malware suffers from a remote command execution vulnerability.

September 20, 2022Backdoor.Win32.Hellza.120 MVID-2022-0642 Authentication Bypass

Backdoor.Win32.Hellza.120 malware suffers from an authentication bypass vulnerability.

September 20, 2022Blink1Control2 2.2.7 Weak Password Encryption

Blink1Control2 version 2.2.7 suffers from a weak password encryption vulnerability.

September 20, 2022ProcessMaker Privilege Escalation

ProcessMaker versions prior to 3.5.4 were discovered to be susceptible to a remote privilege escalation vulnerability.

September 20, 2022Buffalo TeraStation Network Attached Storage (NAS) 1.66 Authentication Bypass

Buffalo TeraStation Network Attached Storage (NAS) version 1.66 suffers from an authentication bypass vulnerability.

September 20, 2022Trojan.Ransom.Ryuk.A MVID-2022-0640 Code Execution

Trojan.Ransom.Ryuk.A ransomware looks for and executes DLLs in its current directory. Therefore, we can potentially hijack a DLL, execute our own code, and control and terminate the malware pre-encryption. Once loaded the exploit dll will check if the cur

Archives
Categories
  • All Exploits 4095
  • Remote Code Execution
  • SQL Injection
  • Command Injection
  • Local File Inclusion
  • Cross Site Scripting
  • Privilege Escalation
  • Denial Of Service
  • Authentication Bypass
  • Buffer Overflow