September 20, 2022Bookwyrm 0.4.3 Authentication Bypass

Bookwyrm versions 0.4.3 and below suffer from an authentication bypass vulnerability due to a lack of rate limiting on OTP checks.

September 20, 2022Trojan-Dropper.Win32.Corty.10 MVID-2022-0639 Insecure Credential Storage

Trojan-Dropper.Win32.Corty.10 malware suffers from an insecure credential storage vulnerability.

September 19, 2022PhotoSync 4.7 Local File Inclusion

PhotoSync version 4.7 suffers from a local file inclusion vulnerability.

September 19, 2022Owlfiles File Manager 12.0.1 Path Traversal / Local File Inclusion

Owlfiles File Manager version 12.0.1 suffers from local file inclusion and path traversal vulnerabilities.

September 19, 2022OpenCart 3.x Newsletter Custom Popup 4.0 SQL Injection

OpenCart 3.x Newsletter Custom Popup module version 4.0 suffers from a remote blind SQL injection vulnerability.

September 19, 2022WordPress GetYourGuide Ticketing 1.0.1 Cross Site Scripting

WordPress GetYourGuide Ticketing plugin version 1.0.1 suffers from a persistent cross site scripting vulnerability.

September 19, 2022Genesys PureConnect Cross Site Scripting

Genesys PureConnect as of their build on 08-October-2020 suffers from a cross site scripting vulnerability.

September 19, 2022VIAVIWEB Wallpaper Admin SQL Injection / Shell Upload

VIAVIWEB Wallpaper Admin suffers from remote shell upload and remote SQL injection vulnerabilities.

September 16, 2022SAP SAPControl Web Service Interface Local Privilege Escalation

SAPControl Web Service Interface (sapstartsrv) suffers from a privilege escalation vulnerability via a race condition.

September 16, 2022Palo Alto Networks Authenticated Remote Code Execution

This Metasploit module exploits an OS command injection vulnerability in the PAN-OS management interface that allows authenticated administrators to execute arbitrary OS commands with root privileges. This issue impacts PAN-OS versions prior to 10.0.1, 9.

Archives
Categories
  • All Exploits 4095
  • Remote Code Execution
  • SQL Injection
  • Command Injection
  • Local File Inclusion
  • Cross Site Scripting
  • Privilege Escalation
  • Denial Of Service
  • Authentication Bypass
  • Buffer Overflow