Subscribe via feed.
Archive for December, 2015

[remote] – Joomla 1.5 – 3.4.5 – Object Injection RCE X-Forwarded-For Header

Posted by deepcore under Security (No Respond)

Joomla 1.5 – 3.4.5 – Object Injection RCE X-Forwarded-For Header

Tags: ,

[local] – Microsoft Windows win32k Local Privilege Escalation (MS15-010)

Posted by deepcore under Security (No Respond)

Microsoft Windows win32k Local Privilege Escalation (MS15-010)

Tags: ,

[webapps] – Ovidentia maillist Module 4.0 – Remote File Inclusion Exploit

Posted by deepcore under Security (No Respond)

Ovidentia maillist Module 4.0 – Remote File Inclusion Exploit

Tags: ,

Wireshark Dissct_rsl_ipaccess_msg Out-Of-Bounds Read

Posted by deepcore under exploit (No Respond)

An ASAN build of Wireshark suffers from a static out-of-bounds read in Dissct_rsl_ipaccess_msg.

Wireshark Dissect_zcl_pwr_prof_pwrprofstatersp Out-Of-Bounds Read

Posted by deepcore under exploit (No Respond)

An ASAN build of Wireshark suffers from a static out-of-bounds read in Dissect_zcl_pwr_prof_pwrprofstatersp.

Wireshark Wmem_alloc Assertion Failure Crash

Posted by deepcore under exploit (No Respond)

An ASAN build of Wireshark suffers from an assertion failure crash in Wmem_alloc.

Wireshark Dissect_tds7_colmetadata_token Buffer Overflow

Posted by deepcore under exploit (No Respond)

An ASAN build of Wireshark suffers from a stack-based buffer overflow in Dissect_tds7_colmetadata_token.

FireEye Wormable Remote Code Execution In MIP JAR Analysis

Posted by deepcore under exploit (No Respond)

The FireEye MPS (Malware Protection System) is vulnerable to a remote code execution vulnerability, simply from monitoring hostile traffic. FireEye is designed to operate as a passive network tap, so that it can see all the files and emails that enter a monitored network. This vulnerability allows an attacker to compromise the FireEye device, get […]

PHPads 2.0 File Disclosure

Posted by deepcore under exploit (No Respond)

PHPads version 2.0 suffers from a file disclosure vulnerability.

Ubuntu setgid Directory Privilege Escalation

Posted by deepcore under exploit (No Respond)

This is a short article how to use the setgid directory /var/cache/man to escalate privileges from man/man to man/root on Ubuntu Vivid.