Trend Micro Security (Consumer) Arbitrary Code Execution
Trend Micro Security can potentially allow an attacker to use a malicious program to escalate privileges to SYSTEM integrity and obtain persistence on a vulnerable system.
Trend Micro Security can potentially allow an attacker to use a malicious program to escalate privileges to SYSTEM integrity and obtain persistence on a vulnerable system.
WordPress Postie plugin versions 1.9.40 and below suffer from a persistent cross site scripting vulnerability.
SunOS version 5.10 Generic_147148-26 local privilege escalation exploit. A buffer overflow in the CheckMonitor() function in the Common Desktop Environment versions 2.3.1 and earlier and 1.6 and earlier, as distributed with Oracle Solaris 10 1/13 (Update 11) and earlier, allows local users to gain root privileges via a long palette name passed to dtsession in […]
Online Book Store version 1.0 suffers from an arbitrary file upload vulnerability.
This Metasploit module exploits a denial of service vulnerability in Tautulli version 2.1.9.
This is a proof of concept exploit that demonstrates the Microsoft Windows CryptoAPI spoofing vulnerability as described in CVE-2020-0601 and disclosed by the NSA.
Proof of concept exploit for the Microsoft Windows CurveBall vulnerability where the signature of certificates using elliptic curve cryptography (ECC) is not correctly verified. ECC relies on different parameters. These parameters are standardized for many curves. However, Microsoft did not check all these parameters. The parameter G (the generator) was not checked, and the attacker […]
Jenkins Gitlab Hook plugin version 1.4.2 suffers from a cross site scripting vulnerability.
This is an nmap nse script to test for the path traversal vulnerability in Citrix Application Delivery Controller (ADC) and Gateway.
WordPress Resim ara plugin version 1.0 suffers from a cross site scripting vulnerability.