Trend Micro Security can potentially allow an attacker to use a malicious program to escalate privileges to SYSTEM integrity and obtain persistence on a vulnerable system.
>> ARCHIVE: 2020-01
WordPress Postie plugin versions 1.9.40 and below suffer from a persistent cross site scripting vulnerability.
SunOS version 5.10 Generic_147148-26 local privilege escalation exploit. A buffer overflow in the CheckMonitor() function in the Common Desktop Environment versions 2.3.1 and earlier and 1.6 and earlier, as distributed…
Online Book Store version 1.0 suffers from an arbitrary file upload vulnerability.
This Metasploit module exploits a denial of service vulnerability in Tautulli version 2.1.9.
This is a proof of concept exploit that demonstrates the Microsoft Windows CryptoAPI spoofing vulnerability as described in CVE-2020-0601 and disclosed by the NSA.
Proof of concept exploit for the Microsoft Windows CurveBall vulnerability where the signature of certificates using elliptic curve cryptography (ECC) is not correctly verified. ECC relies on different parameters. These…
Jenkins Gitlab Hook plugin version 1.4.2 suffers from a cross site scripting vulnerability.
This is an nmap nse script to test for the path traversal vulnerability in Citrix Application Delivery Controller (ADC) and Gateway.
WordPress Resim ara plugin version 1.0 suffers from a cross site scripting vulnerability.