Windscribe 1.83 – ‘WindscribeService’ Unquoted Service Path
>> ARCHIVE: 2020-06
Windscribe 1.83 – ‘WindscribeService’ Unquoted Service Path
http://huorua.go.th/d_finance/new_finance/hacked.pdf notified by Crystal_MSF
mySCADA myPRO 7 – Hardcoded Credentials
FHEM 6.0 – Local File Inclusion
LanSpy version 2.0.1.159 stack buffer overflow exploit that adds a user.
Code Blocks version 20.03 denial of service proof of concept exploit.
Lansweeper version 7.2 has a default admin account enabled which allows for remote code execution.
GilaCMS version 1.11.5 suffers from cross site request forgery and cross site scripting vulnerabilities.
Qualys has released their local privilege escalation and remote code execution exploit for qmail that leverages the vulnerability as described in CVE-2005-1513.
Online Student Enrollment System version 1.0 suffers from a cross site request forgery vulnerability.