Subscribe via feed.
Archive for June, 2020

NeonLMS Learning Management System PHP Laravel Script 4.6 XSS

Posted by deepcore under exploit (No Respond)

NeonLMS Learning Management System PHP Laravel Script version 4.6 suffers from a persistent cross site scripting vulnerability.

Cayin Signage Media Player 3.0 Root Remote Command Injection

Posted by deepcore under exploit (No Respond)

CAYIN SMP-xxxx suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user through the NTP_Server_IP HTTP GET parameter in system.cgi and wizard_system.cgi pages.

Navigate CMS 2.8.7 Cross Site Request Forgery

Posted by deepcore under exploit (No Respond)

Navigate CMS version 2.8.7 suffers from a cross site request forgery vulnerability.

Cayin Content Management Server 11.0 Root Remote Command Injection

Posted by deepcore under exploit (No Respond)

CAYIN CMS suffers from an authenticated OS semi-blind command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user through the NTP_Server_IP HTTP POST parameter in system.cgi page.

VMWare vCloud Director 9.7.0.15498291 Remote Code Execution

Posted by deepcore under exploit (No Respond)

VMWare vCloud Director version 9.7.0.15498291 suffers from a remote code execution vulnerability.

Cayin Digital Signage System xPost 2.5 Code Execution / SQL Injection

Posted by deepcore under exploit (No Respond)

CAYIN xPost version 2.5 suffers from an unauthenticated SQL injection vulnerability. Input passed via the GET parameter wayfinder_seqid in wayfinder_meeting_input.jsp is not properly sanitised before being returned to the user or used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code and execute SYSTEM commands.

WebLogic Server Deserialization Remote Code Execution

Posted by deepcore under exploit (No Respond)

This Metasploit module exploits a Java object deserialization vulnerability in multiple versions of WebLogic. Unauthenticated remote code execution can be achieved by sending a serialized BadAttributeValueExpException object over the T3 protocol to vulnerable versions of WebLogic. Leveraging an ExtractorComparator enables the ability to trigger method.invoke(), which will execute arbitrary code.

WordPress Drag And Drop Multi File Uploader Remote Code Execution

Posted by deepcore under exploit (No Respond)

This Metasploit module exploits a file upload feature of Drag and Drop Multi File Upload – Contact Form 7 for versions prior to 1.3.4. The allowed file extension list can be bypassed by appending a %, allowing for php shells to be uploaded. No authentication is required for exploitation.

[webapps] Online-Exam-System 2015 – 'feedback' SQL Injection

Posted by deepcore under Security (No Respond)

Online-Exam-System 2015 – ‘feedback’ SQL Injection

Tags: ,

[webapps] Online Course Registration 1.0 – Authentication Bypass

Posted by deepcore under Security (No Respond)

Online Course Registration 1.0 – Authentication Bypass

Tags: ,