Subscribe via feed.
Archive for May, 2020

i-doit Open Source CMDB 1.14.1 Arbitrary File Deletion

Posted by deepcore under exploit (No Respond)

i-doit Open Source CMDB version 1.14.1 suffers from an arbitrary file deletion vulnerability.

Booked Scheduler 2.7.7 Directory Traversal

Posted by deepcore under exploit (No Respond)

Booked Scheduler version 2.7.7 suffers from an authenticated directory traversal vulnerability.

MPC Sharj 3.11.1 Arbitrary File Download

Posted by deepcore under exploit (No Respond)

MPC Sharj version 3.11.1 suffers from an arbitrary file download vulnerability.

Pisay Online E-Learning System 1.0 SQL Injection / Code Execution

Posted by deepcore under exploit (No Respond)

Pisay Online E-Learning System version 1.0 suffers from remote SQL Injection and code execution vulnerabilities.

YesWiki cercopitheque 2020.04.18.1 SQL Injection

Posted by deepcore under exploit (No Respond)

YesWiki cercopitheque version 2020.04.18.1 suffers from a remote SQL injection vulnerability.

webTareas 2.0.p8 Arbitrary File Deletion

Posted by deepcore under exploit (No Respond)

webTareas version 2.0.p8 suffers from an arbitrary file deletion vulnerability.

Online Clothing Store 1.0 SQL Injection

Posted by deepcore under exploit (No Respond)

Online Clothing Store version 1.0 suffers from a remote SQL injection vulnerability.

Online Clothing Store 1.0 Cross Site Scripting

Posted by deepcore under exploit (No Respond)

Online Clothing Store version 1.0 suffers from a persistent cross site scripting vulnerability.

Extreme Networks Aerohive HiveOS 11.x Denial Of Service

Posted by deepcore under exploit (No Respond)

Extreme Networks Aerohive HiveOS versions 11.x and below remote denial of service exploit. An unauthenticated malicious user can trigger a denial of service (DoS) attack when sending specific application layer packets towards the Aerohive NetConfig UI. This proof of concept exploit renders the application unusable for 305 seconds or 5 minutes with a single HTTP […]

Kentico CMS 12.0.14 Remote Command Execution

Posted by deepcore under exploit (No Respond)

This Metasploit module exploits a vulnerability in the Kentico CMS platform versions 12.0.14 and earlier. Remote command execution is possible via unauthenticated XML requests to the Staging Service SyncServer.asmx interface ProcessSynchronizationTaskData method stagingTaskData parameter. XML input is passed to an insecure .NET deserialize call which allows for remote command execution.