Subscribe via feed.
Archive for November, 2016

http://yasothon.labour.go.th

Posted by deepcore under defacement (No Respond)

http://yasothon.labour.go.th notified by MuhmadEmad

Tags:

Edusson (Robotdon) BB – Bypass & Persistent Vulnerability

Posted by deepcore under exploit (No Respond)

The vulnerability laboratory core research team discovered an application-side vulnerability and a filter bypass issue i…

Edusson (Robotdon) BB – Client Side Cross Site Vulnerability

Posted by deepcore under exploit (No Respond)

The vulnerability laboratory core research team discovered a client-side cross site scripting web vulnerability in the o…

Intel(R) HD Graphics 10.18.10.4358 Privilege Escalation

Posted by deepcore under exploit (No Respond)

Intel(R) HD Graphics version 10.18.10.4358 suffers from an unquoted service path privilege escalation vulnerability.

Spark 2.5 Arbitrary File Read

Posted by deepcore under exploit (No Respond)

Spark version 2.5 suffers from an arbitrary file read vulnerability.

WinaXe 7.7 Buffer Overflow

Posted by deepcore under exploit (No Respond)

WinaXe version 7.l7 suffers from a buffer overflow vulnerability.

Rapid PHP Editor IDE 14.1 Cross Site Request Forgery

Posted by deepcore under exploit (No Respond)

Rapid PHP Editor IDE version 14.1 suffers from a cross site request forgery vulnerability.

http://boca-new.dtam.moph.go.th/king.htm

Posted by deepcore under defacement (No Respond)

http://boca-new.dtam.moph.go.th/king.htm notified by RxR

Tags:

Citrix Receiver / Receiver Desktop Lock 4.5 Authentication Bypass

Posted by deepcore under exploit (No Respond)

Citrix Receiver / Receiver Desktop Lock version 4.5 suffers from an authentication bypass vulnerability.

MySQL / MariaDB / PerconaDB Root Privilege Escalation

Posted by deepcore under exploit (No Respond)

MySQL-based databases including MySQL, MariaDB and PerconaDB are affected by a privilege escalation vulnerability which can let attackers who have gained access to mysql system user to further escalate their privileges to root user allowing them to fully compromise the system. The vulnerability stems from unsafe file handling of error logs and other files.