Subscribe via feed.
Archive for February, 2022

Microsoft Exchange Server Remote Code Execution

Posted by deepcore under exploit (No Respond)

This Metasploit module allows remote attackers to execute arbitrary code on Exchange Server 2019 CU10 prior to Security Update 3, Exchange Server 2019 CU11 prior to Security Update 2, Exchange Server 2016 CU21 prior to Security Update 3, and Exchange Server 2016 CU22 prior to Security Update 2. Note that authentication is required to exploit […]

Wondershare MirrorGo 2.0.11.346 Insecure File Permissions

Posted by deepcore under exploit (No Respond)

Wondershare MirrorGo version 2.0.11.346 suffers from an insecure permissions vulnerability.

Simple Mobile Comparison Website 1.0 SQL Injection

Posted by deepcore under exploit (No Respond)

Simple Mobile Comparison Website version 1.0 suffers from a remote SQL injection vulnerability.

Backdoor.Win32.Acropolis.10 Insecure Permissions

Posted by deepcore under exploit (No Respond)

Backdoor.Win32.Acropolis.10 malware suffers from an insecure permissions vulnerability.

Adobe ColdFusion 11 Remote Code Execution

Posted by deepcore under exploit (No Respond)

Adobe ColdFusion version 11.0.03.292866 suffers from an LDAP Java object deserialization remote code execution vulnerability.

aaPanel 6.8.21 Directory Traversal

Posted by deepcore under exploit (No Respond)

aaPanel version 6.8.21 suffers from a directory traversal vulnerability.

Backdoor.Win32.FTP.Ics Man-In-The-Middle

Posted by deepcore under exploit (No Respond)

Backdoor.Win32.FTP.Ics malware suffers from a man-in-the-middle vulnerability.

WebHMI 4.1 Cross Site Scripting

Posted by deepcore under exploit (No Respond)

WebHMI version 4.1 suffers from a persistent cross site scripting vulnerability.

WebHMI 4.1.1 Remote Code Execution

Posted by deepcore under exploit (No Respond)

WebHMI version 4.1.1 suffers from an authenticated remote code execution vulnerability.

Backdoor.Win32.FTP.Ics Authentication Bypass / Code Execution

Posted by deepcore under exploit (No Respond)

Backdoor.Win32.FTP.Ics malware suffers from bypass and code execution vulnerabilities.