A difficult to exploit heap-based buffer overflow in setuid root whodo and w binaries distributed with Solaris allows local users to corrupt memory and potentially execute arbitrary code in order…
>> ARCHIVE: 2020-04
http://www.rb2.go.th/admin/pic_title/1700400107041202004171587057757.jpg notified by Mr.Kro0oz.305
The vulnerability laboratory core research team discovered multiple web vulnerabilities in the official Swift File Trans…
The vulnerability laboratory core research team discovered multiple persistent web vulnerabilities in the official Fork …
This Metasploit module exploits a Java Expression Language (EL) injection in Nexus Repository Manager versions up to and including 3.21.1 to execute code as the Nexus user. Tested against 3.21.1-01.
This Metasploit module exploits a logic flaw due to how the lpApplicationName parameter is handled. When the lpApplicationName contains a space, the file name is ambiguous. Take this file path…
Code Blocks 16.01 – Buffer Overflow (SEH) UNICODE
Nexus Repository Manager – Java EL Injection RCE (Metasploit)
Pinger version 1.0 suffers from a remote code execution vulnerability.
BlazeDVD version 7.0.2 SEH buffer overflow exploit.