[remote] Ruby On Rails – DoubleTap Development Mode secret_key_base Remote Code Execution (Metasploit)
Ruby On Rails – DoubleTap Development Mode secret_key_base Remote Code Execution (Metasploit)
Tags: 0day, remote exploithttp://lpa.nfe.go.th/mj.htm
http://lpa.nfe.go.th/mj.htm notified by M4st3rJ30
Tags: defacementJoomla JiFile 2.3.1 Arbitrary File Download
Joomla JiFile component version 2.3.1 suffers from an arbitrary file download vulnerability.
Agent Tesla Botnet Information Disclosure
Agent Tesla Botnet suffers from an information leakage vulnerability.
Pimcore Unserialize Remote Code Execution
This Metasploit module exploits a PHP unserialize() in Pimcore before 5.7.1 to execute arbitrary code. An authenticated user with “classes” permission could exploit the vulnerability. The vulnerability exists in the “ClassController.php” class, where the “bulk-commit” method makes it possible to exploit the unserialize function when passing untrusted values in “data” parameter. Tested on Pimcore 5.4.0-5.4.4, […]
APT Package Manager Persistence
This Metasploit module creates a pre-invoke hook for APT in apt.conf.d. The hook name syntax is numeric followed by text.
AIS Logistics ESEL-Server SQL Injection / Code Execution
This Metasploit module will execute an arbitrary payload on an “ESEL” server used by the AIS logistic software. The server typically listens on port 5099 without TLS. There could also be server listening on 5100 with TLS but the port 5099 is usually always open. The login process is vulnerable to an SQL Injection. Usually […]
Linux Missing Lockdown
Linux suffers from a missing locking between ELF coredump code and userfaultfd VMA modification.
Revive Adserver Deserialization / Open Redirect
Revive Adserver versions prior to 4.2.0 suffers from deserialization and open redirection vulnerabilities.