Responsive FileManager 9.13.4 XSS / File Manipulation / Traversal
Responsive FileManager version 9.13.4 suffers from bypass, cross site scripting, remote file read, remote file write, and traversal vulnerabilities.
Responsive FileManager version 9.13.4 suffers from bypass, cross site scripting, remote file read, remote file write, and traversal vulnerabilities.
Zortam MP3 Media Studio version 24.15 SEH local buffer overflow exploit.
Fortify Software Security Center versions 17.10, 17.20, and 18.10 suffer from an insecure direct object reference vulnerability related to user projects.
Fortify Software Security Center versions 17.10, 17.20, and 18.10 suffer from an insecure direct object reference vulnerability related to extracting local and ldap users.
This Metasploit module simplifies the rundll32.exe Application Whitelisting Bypass technique. The module creates a webdav server that hosts a dll file. When the user types the provided rundll32 command on a system, rundll32 will load the dll remotely and execute the provided export function. The export function needs to be valid, but the default meterpreter […]
This Metasploit module modifies a registry key, but cleans up the key once the payload has been invoked. The module does not require the architecture of the payload to match the OS.
Fortify Software Security Center (SSC) 17.10/17.20/18.10 – Information Disclosure (2)
Tags: 0day, remote exploitFortify Software Security Center (SSC) 17.10/17.20/18.10 – Information Disclosure
Tags: 0day, remote exploit