Subscribe via feed.
Archive for November, 2016

Apple iOS 10.1 – Multiple Access Permission Vulnerabilities

Posted by deepcore under exploit (No Respond)

The vulnerability laboratory core research team discovered a local passcode bypass via access permission vulnerability i…

CS-Cart 4.3.10 Unauthenticated XXE Injection

Posted by deepcore under exploit (No Respond)

CS-Cart versions 4.3.10 and below suffer from an unauthenticated XML external entity (XXE) injection vulnerability.

Microsoft Internet Explorer 8 Javascript RegExpBase::FBadHeader Use-After-Free

Posted by deepcore under exploit (No Respond)

A specially crafted web-page can cause the Javascript engine of Microsoft Internet Explorer 8 to free memory used for a string. The code will keep a reference to the string and can be forced to reuse it when compiling a regular expression.

WordPress All In One WP Security And Firewall 4.1.9 Cross Site Scripting

Posted by deepcore under exploit (No Respond)

WordPress All In One WP Security and Firewall plugin versions 4.1.4 through 4.1.9 suffer from a cross site scripting vulnerability.

Nginx (Debian-Based Distros) Root Privilege Escalation

Posted by deepcore under exploit (No Respond)

Nginx web server packaging on Debian-based distributions such as Debian or Ubuntu was found to create log directories with insecure permissions which can be exploited by malicious local attackers to escalate their privileges from nginx/web user (www-data) to root. The vulnerability could be easily exploited by attackers who have managed to compromise a web application […]

Microsoft Edge Eval Type Confusion

Posted by deepcore under exploit (No Respond)

In Chakra, function calls can sometimes take an extra internal argument, using the flag CallFlags_ExtraArg. The global eval function makes assumptions about the type of this extra arg, and casts it to a FrameDisplay object. If eval is called from a location in code where an extra parameter is added, for example, a Proxy function […]

Authenticated WMI Exec Via Powershell

Posted by deepcore under exploit (No Respond)

This Metasploit module uses WMI execution to launch a payload instance on a remote machine. In order to avoid AV detection, all execution is performed in memory via psh-net encoded payload. Persistence option can be set to keep the payload looping while a handler is present to receive it. By default the module runs as […]

http://krabi.nfe.go.th/x.txt

Posted by deepcore under defacement (No Respond)

http://krabi.nfe.go.th/x.txt notified by Exploiter-Albania

Tags:

http://nongkung.go.th/2014/x.txt

Posted by deepcore under defacement (No Respond)

http://nongkung.go.th/2014/x.txt notified by Exploiter-Albania

Tags:

http://ipcam.ptlhosp.go.th/qc/templates/beez/index.php

Posted by deepcore under defacement (No Respond)

http://ipcam.ptlhosp.go.th/qc/templates/beez/index.php notified by Hmei7

Tags: