Friday, April 19, 2024

tag:

exploit

PowerPoint Files Used To Push Remote Access Trojans (RAT)

Since December 2021, a growing trend in phishing campaigns has emerged...

Malware That Can Survive OS Reinstalls Strikes Again, Likely for Cyberespionage

A new windows based malware strain that can survive operating system reinstalls was...

Linux full-disk encryption bug fixed – patch now!

Lots of people “run Linux” without really knowing or caring –...

WordPress Core 5.8.2 – ‘WP_Query’ SQL Injection [PoC]

# Exploit Title: WordPress Core 5.8.2 - 'WP_Query' SQL Injection # Date:...

Microsoft Windows Defender – Detections Bypass

Advisory: Exploit Title: Microsoft Internet Explorer / ActiveX Control - Security Bypass Exploit...

Online Railway Reservation System 1.0 – Admin Account Creation (Unauthenticated)

Exploit Title: Online Railway Reservation System 1.0 - Admin Account Creation...

CoreFTP Server build 725 – Directory Traversal (Authenticated)

Exploit Title: CoreFTP Server build 725 - Directory Traversal (Authenticated) ...

WordPress 5.8.3 security update fixes SQL injection, XSS flaws

The WordPress development team released version 5.8.3, a short-cycle security release...

A 9-Year-old Microsoft Flaw is Still Being Exploited By Hackers in 2022

A ZLoader campaign that began in November has infected almost 2,200...

phpKF CMS 3.00 Beta y6 – Remote Code Execution (RCE) (Unauthenticated)

# Exploit Title: phpKF CMS 3.00 Beta y6 - Remote Code...