August 22, 2022Personnel Property Equipment 2015-2022 SQL Injection

Personnel Property Equipment 2015-2022 suffers from a remote SQL injection vulnerability.

August 19, 2022FLIX AX8 1.46.16 Remote Command Execution

FLIR AX8 versions 1.46.16 and below unauthenticated remote OS command injection exploit.

August 19, 2022FLIR AX8 1.46.16 Traversal / Access Control / Command Injection / XSS

FLIR AX8 versions 1.46.16 and below suffer from command injection, directory traversal, improper access control, and cross site scripting vulnerabilities.

August 19, 2022Transposh WordPress Translation 1.0.8.1 Incorrect Authorization

Transposh WordPress Translation versions 1.0.8.1 and below suffer from an incorrect authorization vulnerability.

August 18, 2022Advantech iView NetworkServlet Command Injection

Advantech iView software versions prior to 5.7.04.6469 are vulnerable to an unauthenticated command injection vulnerability via the NetworkServlet endpoint. The database backup functionality passes a user-controlled parameter, backup_file to the mysqldump

August 18, 2022Polar Flow Android 5.7.1 Secret Disclosure

Polar Flow for Android version 5.7.1 stores the username and password in clear text in a file on mobile devices.

August 16, 2022TypeORM 0.3.7 Information Disclosure

TypeORM version 0.3.7 suffers from an information disclosure vulnerability.

August 15, 2022Win32.Ransom.BlueSky MVID-2022-0632 Code Execution

The BlueSky Win32.Ransom.BlueSky ransomware looks for and executes arbitrary DLLs in its current working directory. Therefore, we can hijack a DLL, execute our own code, and control and terminate the malware pre-encryption. The exploit DLL checks if the c

August 15, 2022Inout RealEstate 2.1.2 SQL Injection

Inout RealEstate version 2.1.2 suffers from a remote SQL injection vulnerability.

August 15, 2022Inout SiteSearch 2.0.1 Cross Site Scripting

Inout SiteSearch version 2.0.1 suffers from a cross site scripting vulnerability.

Archives
Categories
  • All Exploits 4095
  • Remote Code Execution
  • SQL Injection
  • Command Injection
  • Local File Inclusion
  • Cross Site Scripting
  • Privilege Escalation
  • Denial Of Service
  • Authentication Bypass
  • Buffer Overflow