LokiLocker looks for and executes DLLs in its current directory. Therefore, we can potentially hijack a vulnerable DLL to execute our own code, control and terminate the malware pre-encryption. The…
>> CATEGORY: exploit
REvil looks for and executes DLLs in its current directory. Therefore, we can potentially hijack a vulnerable DLL to execute our own code, control and terminate the malware pre-encryption. The…
Conti looks for and executes DLLs in its current directory. Therefore, we can potentially hijack a vulnerable DLL to execute our own code and control and terminate the malware pre-encryption….
RedLine looks for and loads a DLL named “wow64log.dll” in WindowsSystem32. Therefore, we can drop our own DLL to intercept and terminate the malware. The exploit DLL will simply display…
RedLine looks for and loads a DLL named “wow64log.dll” in Windows\System32. Therefore, we can drop our own DLL to intercept and terminate the malware. The exploit DLL will simply display…
Toll Tax Management System version 1.0 suffers from a remote SQL injection vulnerability.
Covid 19 Travel Pass Management System version 1.0 suffers from a remote SQL injection vulnerability.
Ransom.LockBit malware suffers from a dll hijacking vulnerability.
Strap versions prior to 3.6.9 and 4.1.5 disclose a user’s password due to simply base64 encoding it and sticking it in a cookie.
WordPress Stafflist plugin version 3.1.2 suffers from a remote SQL injection vulnerability.