Subscribe via feed.
Archive for June, 2020

[webapps] Gila CMS 1.11.8 – 'query' SQL Injection

Posted by deepcore under Security (No Respond)

Gila CMS 1.11.8 – ‘query’ SQL Injection

Tags: ,

[local] Bandwidth Monitor 3.9 – 'Svc10StrikeBandMontitor' Unquoted Service Path

Posted by deepcore under Security (No Respond)

Bandwidth Monitor 3.9 – ‘Svc10StrikeBandMontitor’ Unquoted Service Path

Tags: ,

[webapps] Netgear R7000 Router – Remote Code Execution

Posted by deepcore under Security (No Respond)

Netgear R7000 Router – Remote Code Execution

Tags: ,

[remote] SOS JobScheduler 1.13.3 – Stored Password Decryption

Posted by deepcore under Security (No Respond)

SOS JobScheduler 1.13.3 – Stored Password Decryption

Tags: ,

Frigate Professional 3.36.0.9 Buffer Overflow

Posted by deepcore under exploit (No Respond)

Frigate Professional version 3.36.0.9 Find Computer local SEH buffer overflow proof of concept exploit.

CallStranger UPnP Vulnerability Checker

Posted by deepcore under exploit (No Respond)

The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue. This tool checks for the vulnerability.

SMBleed / SMBGhost Pre-Authentication Remote Code Execution Proof Of Concept

Posted by deepcore under exploit (No Respond)

This proof of concept exploits a pre-authentication remote code execution vulnerability by combining SMBleed with SMBGhost.

SMBleed Uninitialized Kernel Memory Read Proof Of Concept

Posted by deepcore under exploit (No Respond)

This is a proof of concept exploit that demonstrates the SMBleed remote kernel memory read vulnerability.

Background Intelligent Transfer Service Privilege Escalation

Posted by deepcore under exploit (No Respond)

This Metasploit module exploits CVE-2020-0787, an arbitrary file move vulnerability in outdated versions of the Background Intelligent Transfer Service (BITS), to overwrite C:WindowsSystem32WindowsCoreDeviceInfo.dll with a malicious DLL containing the attacker’s payload. To achieve code execution as the SYSTEM user, the Update Session Orchestrator service is then started, which will result in the malicious WindowsCoreDeviceInfo.dll being […]

[webapps] Sysax MultiServer 6.90 – Reflected Cross Site Scripting

Posted by deepcore under Security (No Respond)

Sysax MultiServer 6.90 – Reflected Cross Site Scripting

Tags: ,