Subscribe via feed.
Archive for August, 2018

VMWare Player 12.5.9 Privilege Escalation / Denial Of Service

Posted by deepcore under exploit (No Respond)

VMWare Player version 12.5.9 suffers from denial of service and privilege escalation vulnerabilities.

Linkedin iOS 9.11.8592.4 CPU Resource Exhaustion

Posted by deepcore under exploit (No Respond)

Linkedin mobile iOS application version 9.11.8592.4 suffers from a CPU resource exhaustion vulnerability.

Chartered Accountant : Auditor Website 2.0.1 Cross Site Scripting

Posted by deepcore under exploit (No Respond)

Chartered Accountant: Auditor Website version 2.0.1 suffers from a cross site scripting vulnerability.

WityCMS 0.6.2 Cross Site Request Forgery

Posted by deepcore under exploit (No Respond)

WityCMS version 0.6.2 suffers from a cross site request forgery vulnerability.

TI Online Examination System 2 Arbitrary File Download

Posted by deepcore under exploit (No Respond)

TI Online Examination System version 2 suffers from an arbitrary file download vulnerability.

FB Inboxer 1.2 SQL Injection

Posted by deepcore under exploit (No Respond)

FB Inboxer version 1.2 suffers from a remote SQL injection vulnerability.

ASUS DSL-N12E_C1 1.1.2.3_345 Remote Command Execution

Posted by deepcore under exploit (No Respond)

ASUS DSL-N12E_C1 version 1.1.2.3_345 suffers from a remote command execution vulnerability.

CoSoSys Endpoint Protector 4.5.0.1 Remote Root Command Injection

Posted by deepcore under exploit (No Respond)

CoSoSys Endpoint Protector version 4.5.0.1 suffers from an authenticated remote root command injection vulnerability.

Seq 4.2.476 Authentication Bypass

Posted by deepcore under exploit (No Respond)

Seq versions 4.2.476 and below suffer from an authentication bypass vulnerability.

SecureSphere 12.0.0.50 SealMode Shell Escape

Posted by deepcore under exploit (No Respond)

This Metasploit module exploits a vulnerability in SecureSphere cli to escape the sealed-mode of Imperva and execute code as the root user. This Metasploit module requires credentials of a user to login to the SSH or can be exploited by a less privileged user.