Subscribe via feed.
Archive for October, 2021

High Infinity Technology HiKam S6 1.3.26 Spoofing / Broken Authentication

Posted by deepcore under exploit (No Respond)

High Infinity Technology HiKam S6 versions 1.3.26 and below suffer from broken authentication, enumeration, message protocol downgrade, insufficient use of cryptography, insufficient message protocol checks, device spoofing, outdated components, and weak default credential vulnerabilities. suffers from bypass, man-in-the-middle, and spoofing vulnerabilities.

[webapps] Simple Online College Entrance Exam System 1.0 – SQLi Authentication Bypass

Posted by deepcore under Security (No Respond)

Simple Online College Entrance Exam System 1.0 – SQLi Authentication Bypass

Tags: ,

[webapps] Online Traffic Offense Management System 1.0 – Multiple RCE (Unauthenticated)

Posted by deepcore under Security (No Respond)

Online Traffic Offense Management System 1.0 – Multiple RCE (Unauthenticated)

Tags: ,

[webapps] Online Traffic Offense Management System 1.0 – Multiple XSS (Unauthenticated)

Posted by deepcore under Security (No Respond)

Online Traffic Offense Management System 1.0 – Multiple XSS (Unauthenticated)

Tags: ,

[webapps] Online Traffic Offense Management System 1.0 – Multiple SQL Injection (Unauthenticated)

Posted by deepcore under Security (No Respond)

Online Traffic Offense Management System 1.0 – Multiple SQL Injection (Unauthenticated)

Tags: ,

[webapps] Online DJ Booking Management System 1.0 – 'Multiple' Blind Cross-Site Scripting

Posted by deepcore under Security (No Respond)

Online DJ Booking Management System 1.0 – ‘Multiple’ Blind Cross-Site Scripting

Tags: ,

[local] Google SLO-Generator 2.0.0 – Code Execution

Posted by deepcore under Security (No Respond)

Google SLO-Generator 2.0.0 – Code Execution

Tags: ,

High Infinity Technology HiKam S6 1.3.26 Spoofing / Broken Authentication

Posted by deepcore under exploit (No Respond)

High Infinity Technology HiKam S6 versions 1.3.26 and below suffer from broken authentication, enumeration, message protocol downgrade, insufficient use of cryptography, insufficient message protocol checks, device spoofing, outdated components, and weak default credential vulnerabilities. suffers from bypass, man-in-the-middle, and spoofing vulnerabilities.

Virus.Win32.Renamer.a Insecure Permissions

Posted by deepcore under exploit (No Respond)

Virus.Win32.Renamer.a malware suffers from an insecure permissions vulnerability.

Backdoor.Win32.LolBot.gen Insecure Permissions

Posted by deepcore under exploit (No Respond)

Backdoor.Win32.LolBot.gen malware suffers from an insecure permissions vulnerability.