Subscribe via feed.
Archive for September, 2020

[webapps] B-swiss 3 Digital Signage System 3.6.5 – Cross-Site Request Forgery (Add Maintenance Admin)

Posted by deepcore under Security (No Respond)

B-swiss 3 Digital Signage System 3.6.5 – Cross-Site Request Forgery (Add Maintenance Admin)

Tags: ,

[webapps] Anchor CMS 0.12.7 – Persistent Cross-Site Scripting (Authenticated)

Posted by deepcore under Security (No Respond)

Anchor CMS 0.12.7 – Persistent Cross-Site Scripting (Authenticated)

Tags: ,

[webapps] BigTree CMS 4.4.10 – Remote Code Execution

Posted by deepcore under Security (No Respond)

BigTree CMS 4.4.10 – Remote Code Execution

Tags: ,

Online Food Ordering System 1.0 Remote Code Execution

Posted by deepcore under exploit (No Respond)

Online Food Ordering System version 1.0 suffers from a remote code execution vulnerability.

[webapps] Visitor Management System in PHP 1.0 – Persistent Cross-Site Scripting

Posted by deepcore under Security (No Respond)

Visitor Management System in PHP 1.0 – Persistent Cross-Site Scripting

Tags: ,

[webapps] Simple Online Food Ordering System 1.0 – 'id' SQL Injection (Unauthenticated)

Posted by deepcore under Security (No Respond)

Simple Online Food Ordering System 1.0 – ‘id’ SQL Injection (Unauthenticated)

Tags: ,

Seat Reservation System 1.0 Shell Upload

Posted by deepcore under exploit (No Respond)

Seat Reservation System version 1.0 suffers from an unauthenticated file upload vulnerability that allows for remote code execution.

Comodo Unified Threat Management Web Console 2.7.0 Remote Code Execution

Posted by deepcore under exploit (No Respond)

Comodo Unified Threat Management Web Console version 2.7.0 suffers from a remote code execution vulnerability.

Flatpress Add Blog 1.0.3 Cross Site Scripting

Posted by deepcore under exploit (No Respond)

Flatpress Add Blog version 1.0.3 suffers from a persistent cross site scripting vulnerability.

GoogleCloudPlatform OSConfig Privilege Escalation

Posted by deepcore under exploit (No Respond)

Google’s osconfig agent was vulnerable to local privilege escalation due to relying on a predictable path inside the /tmp directory. An unprivileged malicious process could abuse this flaw to win a race condition and take over the files managed by the high privileged agent process and thus execute arbitrary commands as the root user (full […]