August 8, 2022WordPress Duplicator 1.4.7.1 Backup Disclosure

WordPress Duplicator plugin version 1.4.7.1 suffers from a backup disclosure vulnerability.

August 8, 2022Nortek Linear eMerge E3-Series Account Takeover

Nortek Linear eMerge E3-Series version 0.32-07p suffers from a vulnerability where session fixation tied with cross site scripting can allow for account takeover.

August 5, 2022Zimbra UnRAR Path Traversal

This Metasploit module creates a RAR file that can be emailed to a Zimbra server to exploit CVE-2022-30333. If successful, it plants a JSP-based backdoor in the public web directory, then executes that backdoor. The core vulnerability is a path-traversal

August 5, 2022WordPress Ecwid Ecommerce Shopping Cart 6.10.23 Cross Site Request Forgery

WordPress Ecwid Ecommerce Shopping Cart plugin versions 6.10.23 and below suffer from a cross site request forgery vulnerability.

August 5, 2022Backdoor.Win32.Bushtrommel.122 MVID-2022-0630 Remote Command Execution

Backdoor.Win32.Bushtrommel.122 malware suffers from an unauthenticated remote command execution vulnerability.

August 5, 2022Backdoor.Win32.Bushtrommel.122 MVID-2022-0629 Authentication Bypass

Backdoor.Win32.Bushtrommel.122 malware suffers from an authentication bypass vulnerability.

August 5, 2022Online Admission System 1.0 SQL Injection

Online Admission System version 1.0 suffers from a remote SQL injection vulnerability.

August 5, 2022WordPress Testimonial Slider And Showcase 2.2.6 Cross Site Scripting

WordPress Testimonial Slider and Showcase plugin version 2.2.6 suffers from a persistent cross site scripting vulnerability.

August 4, 2022Backdoor.Win32.Jokerdoor MVID-2022-0628 Buffer Overflow

Backdoor.Win32.Jokerdoor malware suffers from a buffer overflow vulnerability.

August 4, 2022WordPress Download Manager 3.2.50 Arbitrary File Deletion

WordPress Download Manager plugin versions 3.2.50 and below suffer from an arbitrary file deletion vulnerability.

Archives
Categories
  • All Exploits 4095
  • Remote Code Execution
  • SQL Injection
  • Command Injection
  • Local File Inclusion
  • Cross Site Scripting
  • Privilege Escalation
  • Denial Of Service
  • Authentication Bypass
  • Buffer Overflow