April 21, 2022USR IOT 4G LTE Industrial Cellular VPN Router 1.0.36 Remote Root Backdoor

The USR IOT industrial router is vulnerable to hard-coded credentials within its Linux distribution image. These sets of credentials are never exposed to the end-user and cannot be changed through any normal operation of the device. Affected versions incl

April 20, 2022Pharmacy Management System 1.0 SQL Injection

Pharmacy Management System version 1.l0 suffers from a remote SQL injection vulnerability.

April 20, 2022Pharmacy Management System 1.0 Shell Upload

Pharmacy Management System version 1.0 suffers from a remote shell upload vulnerability.

April 20, 2022Online Restaurant Table Reservation System 1.0 SQL Injection

Online Restaurant Table Reservation System version 1.0 suffers from a remote SQL injection vulnerability.

April 20, 20227-Zip 16 DLL Hijacking

7-Zip versions 16 and below, and possibly other software that utilizes the HTML Help System to display help content to the user, are prone to a remote DLL hijacking issue which leads to arbitrary code execution due to an OS issue.

April 19, 2022Backdoor.Win32.GateHell.21 Authentication Bypass

Backdoor.Win32.GateHell.21 malware suffers from an authentication bypass vulnerability.

April 19, 2022Backdoor.Win32.Delf.zn Insecure Credential Storage

Backdoor.Win32.Delf.zn malware suffers from an insecure credential storage vulnerability.

April 19, 2022WordPress Motopress Hotel Booking Lite 4.2.4 SQL Injection

WordPress Motopress Hotel Booking Lite plugin version 4.2.4 suffers from a remote SQL injection vulnerability.

April 19, 2022Linux watch_queue Filter Out-Of-Bounds Write

The Linux watch_queue filter suffers from an out of bounds write vulnerability.

April 19, 2022Backdoor.Win32.GateHell.21 Man-In-The-Middle

Backdoor.Win32.GateHell.21 malware suffers from a man-in-the-middle vulnerability.

Archives
Categories
  • All Exploits 4095
  • Remote Code Execution
  • SQL Injection
  • Command Injection
  • Local File Inclusion
  • Cross Site Scripting
  • Privilege Escalation
  • Denial Of Service
  • Authentication Bypass
  • Buffer Overflow