Red Hat Security Advisory 2023-5239-01
Red Hat Security Advisory 2023-5239-01 – Kernel-based Virtual Machine offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages
Red Hat Security Advisory 2023-5264-01
Red Hat Security Advisory 2023-5264-01 – Kernel-based Virtual Machine offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages
Lamano CMS 2.0 Cross Site Request Forgery
Lamano CMS version 2.0 suffers from a cross site request forgery vulnerability. Exploit Files ≈ Packet Storm
Red Hat Security Advisory 2023-5244-01
Red Hat Security Advisory 2023-5244-01 – The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include information leakage,
WordPress Theme My Login 2FA Brute Force
WordPress Theme My Login 2FA plugin versions prior to 1.2 suffer from a brute forcing vulnerability. Exploit Files ≈ Packet Storm
Apache Airflow 1.10.10 Remote Code Execution
This Metasploit module exploits an unauthenticated command injection vulnerability by combining two critical vulnerabilities in Apache Airflow version 1.10.10. The first, CVE-2020-11978, is an authenticated
Lexmark Device Embedded Web Server Remote Code Execution
An unauthenticated remote code execution vulnerability exists in the embedded webserver in certain Lexmark devices through 2023-02-19. The vulnerability is only exposed if, when setting
WordPress Essential Blocks 4.2.0 / Essential Blocks Pro 1.1.0 PHP Object Injection
WordPress Essential Blocks plugin versions 4.2.0 and below and Essential Blocks Pro versions 1.1.0 and below suffer from multiple PHP object injection vulnerabilities. Exploit Files ≈
Taskhub 2.8.7 SQL Injection
Taskhub version 2.8.7 suffers from a remote SQL injection vulnerability. Exploit Files ≈ Packet Storm
Packers And Movers Management System 1.0 SQL Injection
Packers and Movers Management System version 1.0 suffers from a remote blind SQL injection vulnerability. Proof of concept exploit written in python included. Exploit Files ≈