Subscribe via feed.
Archive for June, 2020

Cisco AnyConnect Path Traversal / Privilege Escalation

Posted by deepcore under exploit (No Respond)

The installer component of Cisco AnyConnect Secure Mobility Client for Windows prior to version 4.8.02042 is vulnerable to path traversal and allows local attackers to create/overwrite files in arbitrary locations with system level privileges. The attack consists in sending a specially crafted IPC request to the TCP port 62522 on the loopback device, which is […]

ASUS Aura Sync 1.07.71 Privilege Escalation

Posted by deepcore under exploit (No Respond)

ASUS Aura Sync version 1.07.71 ene.sys privilege escalation kernel exploit.

Windows Print Spooler Privilege Escalation

Posted by deepcore under exploit (No Respond)

This is a proof of concept exploit that takes advantage of a privilege escalation vulnerability in the Windows Print Spooler.

FHEM 6.0 Local File Inclusion

Posted by deepcore under exploit (No Respond)

FHEM version 6.0 suffers from a local file inclusion vulnerability.

Online Student Enrollment System 1.0 Shell Upload

Posted by deepcore under exploit (No Respond)

This Metasploit module exploits a cross site request forgery vulnerability in Online Student Enrollment System version 1.0 to perform a shell upload.

iOS / macOS Wifi Proximity Kernel Double-Free

Posted by deepcore under exploit (No Respond)

iOS and macOS suffered from a wifi proximity kernel double-free vulnerability in AWDL BSS Steering.

Inductive Automation Ignition Remote Code Execution

Posted by deepcore under exploit (No Respond)

This Metasploit module exploits a Java deserialization vulnerability in the Inductive Automation Ignition SCADA product, versions 8.0.0 to (and including) 8.0.7. This exploit was tested on versions 8.0.0 and 8.0.7 on both Linux and Windows. The default configuration is exploitable by an unauthenticated attacker, which can achieve remote code execution as SYSTEM on a Windows […]

Microsoft: Patch Your Exchange Servers, They're Under Attack

Posted by deepcore under exploit (No Respond)

[local] KiteService 1.2020.618.0 – Unquoted Service Path

Posted by deepcore under Security (No Respond)

KiteService 1.2020.618.0 – Unquoted Service Path

Tags: ,

[webapps] OpenEMR 5.0.1 – 'controller' Remote Code Execution

Posted by deepcore under Security (No Respond)

OpenEMR 5.0.1 – ‘controller’ Remote Code Execution

Tags: ,