A difficult to exploit heap-based buffer overflow in setuid root whodo and w binaries distributed with Solaris allows local users to corrupt memory and potentially execute arbitrary code in order to escalate privileges.
http://www.rb2.go.th/admin/pic_title/1700400107041202004171587057757.jpg notified by Mr.Kro0oz.305
Tags:
defacement
The vulnerability laboratory core research team discovered multiple web vulnerabilities in the official Swift File Trans…
The vulnerability laboratory core research team discovered multiple persistent web vulnerabilities in the official Fork …
This Metasploit module exploits a Java Expression Language (EL) injection in Nexus Repository Manager versions up to and including 3.21.1 to execute code as the Nexus user. Tested against 3.21.1-01.
This Metasploit module exploits a logic flaw due to how the lpApplicationName parameter is handled. When the lpApplicationName contains a space, the file name is ambiguous. Take this file path as example: C:program fileshello.exe; The Windows API will try to interpret this as two possible paths: C:program.exe, and C:program fileshello.exe, and then execute all of […]
Code Blocks 16.01 – Buffer Overflow (SEH) UNICODE
Tags:
0day,
remote exploit
Nexus Repository Manager – Java EL Injection RCE (Metasploit)
Tags:
0day,
remote exploit
Pinger version 1.0 suffers from a remote code execution vulnerability.
BlazeDVD version 7.0.2 SEH buffer overflow exploit.