Subscribe via feed.
Archive for January, 2019

Eco Search 1.0.2.0 Denial Of Service

Posted by deepcore under exploit (No Respond)

Eco Search version 1.0.2.0 suffers from a denial of service vulnerability.

FastTube 1.0.1.0 Denial Of Service

Posted by deepcore under exploit (No Respond)

FastTube version 1.0.1.0 suffers from a denial of service vulnerability.

SSHtranger Things SCP Client File Issue

Posted by deepcore under exploit (No Respond)

SCP clients have an issue where additional files can be copied over without your knowledge.

Webmin 1.900 Remote Command Execution

Posted by deepcore under exploit (No Respond)

This Metasploit module exploits an arbitrary command execution vulnerability in Webmin versions 1.900 and below. Any user authorized to the “Java file manager” and “Upload and Download” fields, to execute arbitrary commands with root privileges. In addition, “Running Processes” field must be authorized to discover the directory to be uploaded. A vulnerable file can be […]

DotNetNuke Events Calendar 1.x File Download

Posted by deepcore under exploit (No Respond)

DotNetNuke Events Calendar module version 1.x suffers from a file download vulnerability.

SeoToaster Ecommerce 3.0.0 Local File Inclusion

Posted by deepcore under exploit (No Respond)

SeoToaster Ecommerce version 3.0.0 suffers from a local file inclusion vulnerability.

phpTransformer 2016.9 SQL Injection

Posted by deepcore under exploit (No Respond)

phpTransformer version 2016.9 suffers from a remote SQL injection vulnerability.

phpTransformer 2016.9 Directory Traversal

Posted by deepcore under exploit (No Respond)

phpTransformer version 2016.9 suffers from a directory traversal vulnerability.

Joomla! 3.9.1 Cross Site Scripting

Posted by deepcore under exploit (No Respond)

Joomla! version 3.9.1 suffers from a persistent cross site scripting vulnerability in the global configuration textfilter settings.

Kentix MultiSensor-LAN 5.63.00 Authentication Bypass

Posted by deepcore under exploit (No Respond)

Kentix MultiSensor-LAN versions 5.63.00 and below suffer from an authentication bypass vulnerability. The web based application is not using a usual session concept with a session cookie for managing authenticated user sessions. Some URLs are protected with HTTP Basic Authentication, but the user management web page can be accessed and used without any authentication.