High Infinity Technology HiKam S6 versions 1.3.26 and below suffer from broken authentication, enumeration, message protocol downgrade, insufficient use of cryptography, insufficient message protocol checks, device spoofing, outdated components, and weak default credential vulnerabilities. suffers from bypass, man-in-the-middle, and spoofing vulnerabilities.
Simple Online College Entrance Exam System 1.0 – SQLi Authentication Bypass
Tags:
0day,
remote exploit
Online Traffic Offense Management System 1.0 – Multiple RCE (Unauthenticated)
Tags:
0day,
remote exploit
Online Traffic Offense Management System 1.0 – Multiple XSS (Unauthenticated)
Tags:
0day,
remote exploit
Online Traffic Offense Management System 1.0 – Multiple SQL Injection (Unauthenticated)
Tags:
0day,
remote exploit
Online DJ Booking Management System 1.0 – ‘Multiple’ Blind Cross-Site Scripting
Tags:
0day,
remote exploit
Google SLO-Generator 2.0.0 – Code Execution
Tags:
0day,
remote exploit
High Infinity Technology HiKam S6 versions 1.3.26 and below suffer from broken authentication, enumeration, message protocol downgrade, insufficient use of cryptography, insufficient message protocol checks, device spoofing, outdated components, and weak default credential vulnerabilities. suffers from bypass, man-in-the-middle, and spoofing vulnerabilities.
Virus.Win32.Renamer.a malware suffers from an insecure permissions vulnerability.
Backdoor.Win32.LolBot.gen malware suffers from an insecure permissions vulnerability.