Subscribe via feed.
Archive for May, 2018

[webapps] Healwire Online Pharmacy 3.0 – Persistent Cross-Site Scripting / Cross-Site Request Forgery

Posted by deepcore under Security (No Respond)

Healwire Online Pharmacy 3.0 – Persistent Cross-Site Scripting / Cross-Site Request Forgery

Tags: ,

Inteno IOPSYS 2.0 – 4.2.0 p910nd Remote Command Execution

Posted by deepcore under exploit (No Respond)

Inteno IOPSYS version 2.0 – 4.2.0 p910nd suffers from a remote command execution vulnerability.

Horse Market Sell And Rent Portal Script 1.5.7 CSRF

Posted by deepcore under exploit (No Respond)

Horse Market Sell and Rent Port Script version 1.5.7 suffers from a cross site request forgery vulnerability.

Multiplayer BlackJack Online Casino Game 2.5 Cross Site Scripting

Posted by deepcore under exploit (No Respond)

Multiplayer BlackJack Online Casino Game version 2.5 suffers from a persistent cross site scripting vulnerability.

Rockwell Scada System 27.011 Cross Site Scripting

Posted by deepcore under exploit (No Respond)

Rockwell Scada System version 27.011 suffers from a cross site scripting vulnerability.

VirtueMart 3.1.14 Cross Site Scripting

Posted by deepcore under exploit (No Respond)

VirtueMart version 3.1.14 suffers from a cross site scripting vulnerability.

MyBB Admin Notes 1.1 Cross Site Request Forgery

Posted by deepcore under exploit (No Respond)

MyBB Admin Notes plugin version 1.1 suffers from a cross site request forgery vulnerability.

Signal Desktop HTML Tag Injection Variant 2

Posted by deepcore under exploit (No Respond)

This advisory documents proof of concept flows for manipulation the HTML tag injection vulnerability discovered in Signal Desktop. Versions affected include 1.7.1, 1.8.0, 1.9.0, 1.10.0, and 1.10.1.

Apache Struts 2 Struts 1 Plugin Showcase OGNL Code Execution

Posted by deepcore under exploit (No Respond)

This Metasploit module exploits a remote code execution vulnerability in the Struts Showcase app in the Struts 1 plugin example in Struts 2.3.x series. Remote code execution can be performed via a malicious field value.

Jenkins CLI HTTP Java Deserialization

Posted by deepcore under exploit (No Respond)

This Metasploit module exploits a vulnerability in Jenkins. An unsafe deserialization bug exists on the Jenkins, which allows remote arbitrary code execution via HTTP. Authentication is not required to exploit this vulnerability.