Live Feed Aggregator

βš”οΈ Exploit

Latest exploit updates from 5 cybersecurity sources. 15 articles curated.

Articles
Categories
Sources
Exploit-DB.com RSS Feed Mar 3, 2026

[webapps] WordPress Backup Migration 1.3.7 - Remote Command Execution

WordPress Backup Migration 1.3.7 - Remote Command Execution

Exploit-DB.com RSS Feed Mar 3, 2026

[webapps] mailcow 2025-01a - Host Header Password Reset Poisoning

mailcow 2025-01a - Host Header Password Reset Poisoning

Exploit-DB.com RSS Feed Mar 3, 2026

[webapps] Easy File Sharing Web Server v7.2 - Buffer Overflow

Easy File Sharing Web Server v7.2 - Buffer Overflow

Exploit-DB.com RSS Feed Mar 3, 2026

[webapps] WeGIA 3.5.0 - SQL Injection

WeGIA 3.5.0 - SQL Injection

Exploit-DB.com RSS Feed Mar 3, 2026

[webapps] Boss Mini v1.4.0 - Local File Inclusion (LFI)

Boss Mini v1.4.0 - Local File Inclusion (LFI)

Vulnerabilities! - Zero Science Lab Mar 2, 2026

Honeywell Trend IQ4xx BMS Controller Unauthenticated Remote Web-HMI Control And Lockout

The IQ4xx building management controller, manufactured by Honeywell, exposes its full web-based HMI without authentication in its factory-default configuration. With no user module configured, security is disabled by design and the system operates under a System User (level 100) context, granting read/write...

Vulnerabilities! - Zero Science Lab Feb 24, 2026

Tattile Cameras 1.181.5 Unauthenticated RTSP Stream Disclosure

The Tattile cameras suffer from an unauthenticated and unauthorized live RTSP video stream access.

Vulnerabilities! - Zero Science Lab Feb 24, 2026

Tattile Cameras 1.181.5 Use of Default Credentials

The Tattile cameras ship with default credentials that remain active after installation and commissioning without enforcing a mandatory password change.

Vulnerabilities! - Zero Science Lab Feb 24, 2026

Tattile Cameras 1.181.5 Insufficient Token (X-User-Token) Expiration

The application suffers an insufficient session expiration. This occurs when the web application permits an attacker to reuse old session credentials or tokens for authorization. Insufficient session expiration increases the device's exposure to attacks that can steal or reuse user's session identifiers.

Vulnerabilities! - Zero Science Lab Feb 14, 2026

eNet SMART HOME server 2.3.1 (setUserGroup) Remote Privilege Escalation

The eNet Smart Home system suffers from a privilege escalation vulnerability due to insufficient authorization checks in the JSON-RPC endpoint for user management. A low-privileged user, can exploit the "setUserGroup" method by sending a crafted POST request to /jsonrpc/management, specifying their own username and...

Vulnerability Magazine - Acknoweldgements, Bug Bounties & Security Research Jul 3, 2023

Citrix Gateway & Cloud MFA - Insufficient Session Validation Vulnerability

Vulnerability Magazine - Acknoweldgements, Bug Bounties & Security Research Oct 25, 2021

Bundeswehr Generalmajor officially acknowledges Whitehat for Responsible Disclosure Activities

Vulnerability Magazine - Acknoweldgements, Bug Bounties & Security Research Oct 19, 2021

BMW Mail - Persistent Validation Vulnerability

Vulnerability Magazine - Acknoweldgements, Bug Bounties & Security Research Jul 28, 2021

Google Upgrades VRP Bug Bounty Platform

Vulnerability Magazine - Acknoweldgements, Bug Bounties & Security Research Apr 6, 2021

MSRC extends Bug Bounty Program for Microsoft Teams