Subscribe via feed.
Archive for February, 2018

Sprecher Automation SPRECON-E-C / PU-2433 Traversal / DoS

Posted by deepcore under exploit (No Respond)

Sprecher Automation SPRECON-E-C and PU-2433 versions prior to 8.49 suffer from directory traversal, missing authentication, broken authentication, and denial of service vulnerabilities.

Chromium filesystem::mojom::Directory Sandbox Escape

Posted by deepcore under exploit (No Respond)

Chromium suffers from a sandbox escape vulnerability via an exposed filesystem::mojom::Directory mojo interface in the catalog service.

IPSwitch MoveIt 9.4 Cross Site Scripting

Posted by deepcore under exploit (No Respond)

IPSwitch MoveIt versions 8.1 through 9.4 suffer from a persistent cross site scripting vulnerability.

BMC Server Automation RSCD Agent NSH Remote Command Execution

Posted by deepcore under exploit (No Respond)

This Metasploit module exploits a weak access control check in the BMC Server Automation RSCD agent that allows arbitrary operating system commands to be executed without authentication. Note: Under Windows, non-powershell commands may need to be prefixed with ‘cmd /c’.

Packet Storm New Exploits For January, 2018

Posted by deepcore under exploit (No Respond)

This archive contains all of the 268 exploits added to Packet Storm in January, 2018.

[dos] WebKit – 'WebCore::FrameView::clientToLayoutViewportPoint' Use-After-Free

Posted by deepcore under Security (No Respond)

WebKit – ‘WebCore::FrameView::clientToLayoutViewportPoint’ Use-After-Free

Tags: ,

[papers] Jailbreaking iOS 11.1.2: An adventure into the XNU kernel

Posted by deepcore under Security (No Respond)

Jailbreaking iOS 11.1.2: An adventure into the XNU kernel

Tags: ,

[remote] BMC Server Automation RSCD Agent – NSH Remote Command Execution (Metasploit)

Posted by deepcore under Security (No Respond)

BMC Server Automation RSCD Agent – NSH Remote Command Execution (Metasploit)

Tags: ,

[remote] Sync Breeze Enterprise 10.4.18 – Remote Buffer Overflow (SEH)

Posted by deepcore under Security (No Respond)

has been added to (https://www.exploit-db.com)

Tags: ,