Subscribe via feed.
Archive for February, 2020

freeFTPd 1.0.13 Unquoted Service Path

Posted by deepcore under exploit (No Respond)

freeFTPd version 1.0.13 suffers from an unquoted service path vulnerability.

Disk Sorter Enterprise 12.4.16 Unquoted Service Path

Posted by deepcore under exploit (No Respond)

Disk Sorter Enterprise version 12.4.16 suffers from an unquoted service path vulnerability.

Disk Savvy Enterprise 12.3.18 Unquoted Service Path

Posted by deepcore under exploit (No Respond)

Disk Savvy Enterprise version 12.3.18 suffers from an unquoted service path vulnerability.

Sync Breeze Enterprise 12.4.18 Unquoted Service Path

Posted by deepcore under exploit (No Respond)

Sync Breeze Enterprise version 12.4.18 suffers from an unquoted service path vulnerability.

FreeSSHd 1.3.1 Unquoted Service Path

Posted by deepcore under exploit (No Respond)

FreeSSHd version 1.3.1 suffers from an unquoted service path vulnerability.

CHIYU BF430 TCP IP Converter Cross Site Scripting

Posted by deepcore under exploit (No Respond)

CHIYU BF430 TCP IP Converter suffers from a persistent cross site scripting vulnerability.

DVD Photo Slideshow Professional 8.07 Buffer Overflow

Posted by deepcore under exploit (No Respond)

DVD Photo Slideshow Professional version 8.07 Name and Key buffer overflow proof of concept exploits.

Wedding Slideshow Studio 1.36 Buffer Overflow

Posted by deepcore under exploit (No Respond)

Wedding Slideshow Studio version 1.36 suffers from a buffer overflow vulnerability.

OpenSMTPD 6.6.1 Local Privilege Escalation

Posted by deepcore under exploit (No Respond)

smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell meta-characters in a MAIL FROM field. This affects the “uncommented” default configuration. The issue exists because of an incorrect return value upon failure […]

Google Chrome PannerHandler::TailTime Heap Use-After-Free

Posted by deepcore under exploit (No Respond)

Google Chrome suffers from a heap use-after-free vulnerability in PannerHandler::TailTime.