September 9, 2022SACCO-2022 SQL Injection

SACCO-2022 suffers from a remote SQL injection vulnerability.

September 8, 2022Apache Spark Unauthenticated Command Injection

This Metasploit module exploits an unauthenticated command injection vulnerability in Apache Spark. Successful exploitation results in remote code execution under the context of the Spark application user. The command injection occurs because Spark checks

September 7, 2022Trojan-Ransom.Win32.Hive.bv MVID-2022-0636 Code Execution

Trojan-Ransom.Win32.Hive.bv malware suffers from a code execution vulnerability.

September 7, 2022Trojan.Win32.Autoit.fhj MVID-2022-0638 NULL DACL

Trojan.Win32.Autoit.fhj malware creates two processes "xservice.exe" and a child process "xps.exe". The process creates an IPC pipe with a NULL DACL allowing RW for the Everyone user group.

September 7, 2022FE File Explorer 11.0.4 Local File Inclusion

FE File Explorer version 11.0.4 suffers from a local file inclusion vulnerability.

September 7, 2022Trojan-Spy.Win32.Pophot.bsl MVID-2022-0635 Insecure Permissions

Trojan-Spy.Win32.Pophot.bsl malware suffers from an insecure permissions vulnerability.

September 7, 2022Backdoor.Win32.Hupigon.aspg MVID-2022-0634 Unquoted Service Path

Backdoor.Win32.Hupigon.aspg malware suffers from an unquoted service path vulnerability.

September 7, 2022Backdoor.Win32.Winshell.5_0 MVID-2022-0633 Hardcoded Credential

Backdoor.Win32.Winshell.5_0 malware suffers from a hardcoded credential vulnerability.

September 7, 2022FTPManager 8.2 Local File Inclusion / Directory Traversal

FTPManager version 8.2 suffers from local file inclusion and directory traversal vulnerabilities.

September 7, 2022Trojan.Win32.Autoit.fhj MVID-2022-0637 Insecure Permissions

Trojan.Win32.Autoit.fhj malware suffers from an insecure permissions vulnerability.

Archives
Categories
  • All Exploits 4095
  • Remote Code Execution
  • SQL Injection
  • Command Injection
  • Local File Inclusion
  • Cross Site Scripting
  • Privilege Escalation
  • Denial Of Service
  • Authentication Bypass
  • Buffer Overflow