Subscribe via feed.
Archive for February, 2016

WP Good News Themes – CS Cross Site Web Vulnerability

Posted by deepcore under exploit (No Respond)

An independent vulnerability laboratory researcher discovered a client-side cross site scripting web vulnerability in the official WordPress Good News Themes.

Zimbra 8.0.9 GA Cross Site Request Forgery

Posted by deepcore under exploit (No Respond)

Zimbra versions 8.0.9 GA and below suffer from a cross site request forgery vulnerability.

Centreon 2.5.3 Code Execution

Posted by deepcore under exploit (No Respond)

Centreon versions 2.5.3 and below suffer from a remote code execution vulnerability.

Proxmox VE 3 / 4 XSS / Privilege Escalation / Code Execution

Posted by deepcore under exploit (No Respond)

Proxmox VE versions 3 and 4 suffers from privilege escalation, code execution, and cross site scripting vulnerabilities.

[webapps] – WordPress More Fields <= 2.1 Plugin – CSRF Vulnerability

Posted by deepcore under Security (No Respond)

WordPress More Fields <= 2.1 Plugin – CSRF Vulnerability

Tags: ,

[local] – Comodo Anti-Virus SHFolder.DLL – Local Privilege Elevation Exploit

Posted by deepcore under Security (No Respond)

Comodo Anti-Virus SHFolder.DLL – Local Privilege Elevation Exploit

Tags: ,

GIMP For Windows DLL Hijacking

Posted by deepcore under exploit (No Respond)

GIMP for Windows suffers from a dll hijacking vulnerability.

WordPress User Submitted Posts 20151113 Cross Site Scripting

Posted by deepcore under exploit (No Respond)

WordPress User Submitted Posts plugin version 20151113 suffers from a persistent cross site scripting vulnerability.

JSN PowerAdmin 2.3.0 Code Exection / CSRF / XSS

Posted by deepcore under exploit (No Respond)

JSN PowerAdmin Joomla! extension version 2.3.0 suffers from cross site request forgery, code execution, and cross site scripting vulnerabilities.

Open Web Analytics 1.5.7 Cross Site Scripting

Posted by deepcore under exploit (No Respond)

Open Web Analytics version 1.5.7 suffers from a cross site scripting vulnerability.