Subscribe via feed.
Archive for June, 2017

[webapps] IDERA Uptime Monitor 7.8 – Multiple Vulnerabilities

Posted by deepcore under Security (No Respond)

IDERA Uptime Monitor 7.8 – Multiple Vulnerabilities

Tags: ,

Apple Safari 10.1 Spread Operator Integer Overflow

Posted by deepcore under Apple (No Respond)

Apple Safari version 10.1 suffers from a spread operator integer overflow vulnerability.

Tags: , ,

Android Device QSEE Trustlet Revocation

Posted by deepcore under exploit (No Respond)

Multiple Android devices do not revoke known-bad QSEE trustlets.

Evolution Script CMS v5.3 – Cross Site Scripting Vulnerability

Posted by deepcore under exploit (No Respond)

The vulnerability laboratory core research team discovered a client-side cross site scripting vulnerability in the offic…

http://www.brm3.go.th/person/web1/file_editor/sue.txt

Posted by deepcore under defacement (No Respond)

http://www.brm3.go.th/person/web1/file_editor/sue.txt notified by d4nCogz_010

Tags:

http://www.wangsawan.go.th/web1/file_editor/sue.txt

Posted by deepcore under defacement (No Respond)

http://www.wangsawan.go.th/web1/file_editor/sue.txt notified by d4nCogz_010

Tags:

http://satun.nfe.go.th/t_puyou/web1/file_editor/sue.txt

Posted by deepcore under defacement (No Respond)

http://satun.nfe.go.th/t_puyou/web1/file_editor/sue.txt notified by d4nCogz_010

Tags:

http://ska.onab.go.th/images/jdownloads/screenshots/tech.gif

Posted by deepcore under defacement (No Respond)

http://ska.onab.go.th/images/jdownloads/screenshots/tech.gif notified by KkK1337

Tags:

Xavier v2.4 PHP MP – SQL Injection Web Vulnerabilities

Posted by deepcore under exploit (No Respond)

The vulnerability laboratory core research team discovered multiple sql-injection web vulnerabilities in the Xavier PHP …

EnGenius EnShare IoT Gigabit Cloud Service 1.4.11 Root Remote Code Execution

Posted by deepcore under exploit (No Respond)

EnGenius EnShare suffers from an unauthenticated command injection vulnerability in which an attacker can inject and execute arbitrary code as the root user via the ‘path’ GET/POST parameter parsed by ‘usbinteract.cgi’ script.