Subscribe via feed.
Archive for September, 2015

Rowhammer Linux Kernel Privilege Escalation Proof Of Concept

Posted by deepcore under exploit (No Respond)

Proof of concept exploit code for the Linux Rowhammer DRAM privilege escalation vulnerability.

ManageEngine EventLog Analyzer Remote Code Execution

Posted by deepcore under exploit (No Respond)

This Metasploit module exploits a SQL query functionality in ManageEngine EventLog Analyzer v10.6 build 10060 and previous versions. Every authenticated user, including the default “guest” account can execute SQL queries directly on the underlying Postgres database server. The queries are executed as the “postgres” user which has full privileges and thus is able to write […]

WinRAR SFX 5.21 Remote Code Execution

Posted by deepcore under exploit (No Respond)

WinRAR SFX version 5.21 suffers from a remote code execution vulnerability.

BisonWare BisonFTP 3.5 Directory Traversal

Posted by deepcore under exploit (No Respond)

BisonWare BisonFTP version 3.5 suffers from a directory traversal vulnerability.

Flash Failing Checks On uint Capacity Field

Posted by deepcore under exploit (No Respond)

The latest version of the Vector.primitive length check in Flash 18,0,0,232 is not robust against memory corruptions such as heap overflows. While it is no longer possible to obviously bypass the length check there is still unguarded data in the object which could be corrupted to serve as a useful primitive.

Centreon 2.6.1 Add Administrator Cross Site Request Forgery

Posted by deepcore under exploit (No Respond)

Centreon version 2.6.1 add administrator cross site request forgery exploit.

Photos In Wifi 1.0.1 File Upload

Posted by deepcore under exploit (No Respond)

Photos in Wifi version 1.0.1 suffers from a remote shell upload vulnerability.

IconLover 5.4.5 Stack Buffer Overflow

Posted by deepcore under exploit (No Respond)

IconLover version 5.4.5 suffers from a stack buffer overflow vulnerability.

Centreon 2.6.1 Command Injection

Posted by deepcore under exploit (No Respond)

Centreon version 2.6.1 suffers from a command injection vulnerability. The POST parameter ‘persistant’ which serves for making a new service run in the background is not properly sanitized before being used to execute commands. This can be exploited to inject and execute arbitrary shell commands as well as using cross site request forgery attacks.

Vtiger CRM 6.3 Remote Code Execution

Posted by deepcore under exploit (No Respond)

Vtiger CRM versions 6.3 and below suffer from an authenticated remote code execution vulnerability.