Subscribe via feed.
Archive for November, 2016

Eagle Speed USB Modem Software Privilege Escalation

Posted by deepcore under exploit (No Respond)

Eagle Speed USB modem software suffers from a privilege escalation vulnerability.

Google Chrome Accessibility blink::Node Corruption

Posted by deepcore under exploit (No Respond)

A specially crafted web-page can trigger an unknown memory corruption vulnerability in Google Chrome Accessibility code. An attacker can cause code to attempt to execute a method of an object using a vftable, when the pointer to that object is not valid, or the object is not of the expected type. Successful exploitation can lead […]

WordPress Insert Html Snippet 1.2 Cross Site Request Forgery

Posted by deepcore under exploit (No Respond)

WordPress Insert Html Snippet plugin version 1.2 suffers from a cross site request forgery vulnerability.

WinPower 4.9.0.4 Privilege Escalation

Posted by deepcore under exploit (No Respond)

WinPower version 4.9.0.4 suffers from a privilege escalation vulnerability. Proof of concept code included.

Peplink NGxxx/LCxxx VPN-Firewall Open Redirect

Posted by deepcore under exploit (No Respond)

Input passed via the ‘_redirect’ GET parameter via ‘service.cgi’ script on various Peplink VPN-Firewall devices is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain.

http://audit.dmh.go.th/adr.htm

Posted by deepcore under defacement (No Respond)

http://audit.dmh.go.th/adr.htm notified by aDriv4

Tags:

The FBI Used A Non-Public Vulnerability To Hack Suspects On Tor

Posted by deepcore under exploit (No Respond)

UCanCode Remote Code Execution / Denial Of Service

Posted by deepcore under exploit (No Respond)

UCanCode has active-x vulnerabilities which allow for remote code execution and denial of service attacks.

Red Hat JBoss EAP 5.2.x Untrusted Data Deserialization

Posted by deepcore under exploit (No Respond)

JBoss EAP’s JMX Invoker Servlet is exposed by default on port 8080/TCP. The communication employs serialized Java objects, encapsulated in HTTP requests and responses. The server deserializes these objects without checking the object type. This behavior can be exploited to cause a denial of service and potentially execute arbitrary code.

GNU Wget Access List Bypass / Race Condition

Posted by deepcore under exploit (No Respond)

GNU wget versions 1.17 and earlier, when used in mirroring/recursive mode, are affected by a race condition vulnerability that might allow remote attackers to bypass intended wget access list restrictions specified with the -A parameter. This might allow attackers to place malicious/restricted files onto the system. Depending on the application / download directory, this could […]