Subscribe via feed.
Archive for May, 2018

Flexense DiskBoss 9.1.16 Cross Site Scripting

Posted by deepcore under exploit (No Respond)

Flexense DiskBoss versions 7.4.28 through 9.1.16 suffer from a cross site scripting vulnerability.

Flexense Disksavvy 10.7 Cross Site Scripting

Posted by deepcore under exploit (No Respond)

Flexense Disksavvy versions 10.4 through 10.7 suffer from a cross site scripting vulnerability.

LibreOffice 6.0.3 / OpenOffice 4.1.5 Information Disclosure

Posted by deepcore under exploit (No Respond)

LibreOffice version 6.0.3 and OpenOffice version 4.1.5 suffers from a .odt information disclosure vulnerability.

Exim base64d Remote Code Execution

Posted by deepcore under exploit (No Respond)

Exim versions prior to 4.90.1 suffer from a base64d remote code execution vulnerability.

Flexense DupScout 10.7 Cross Site Scripting

Posted by deepcore under exploit (No Respond)

Flexense DupScout versions 10.0.18 through 10.7 suffer from a cross site scripting vulnerability.

Flexense VX Search 10.7 Cross Site Scripting

Posted by deepcore under exploit (No Respond)

Flexense VX Search versions 10.1.12 through 10.7 suffer from a cross site scripting vulnerability.

Flexense DiskSorter 10.7 Cross Site Scripting

Posted by deepcore under exploit (No Respond)

Flexense DiskSorter versions 9.5.12 through 10.7 suffer from a cross site scripting vulnerability.

Arastta 1.6.2 Cross Site Scripting

Posted by deepcore under exploit (No Respond)

Arastta version 1.6.2 suffers from a cross site scripting vulnerability.

Trovebox 4.0.0-rc6 SQL Injection / Bypss / SSRF

Posted by deepcore under exploit (No Respond)

Trovebox versions 4.0.0-rc6 and below suffer from authentication bypass, server-side request forgery, unsafe token generation, nd remote SQL injection vulnerabilities.

osCommerce Installer Unauthenticated Code Execution

Posted by deepcore under exploit (No Respond)

If the /install/ directory was not removed, it is possible for an unauthenticated attacker to run the “install_4.php” script, which will create the configuration file for the installation. This allows the attacker to inject PHP code into the configuration file and execute it.