Subscribe via feed.
Archive for November, 2020

CMSUno 1.6.2 Remote Code Execution

Posted by deepcore under exploit (No Respond)

CMSUno version 1.6.2 authenticated remote code execution exploit.

Asterisk 17.6.0 / 17.5.1 Denial Of Service

Posted by deepcore under exploit (No Respond)

Asterisk versions 17.5.1 and 17.6.0 were found vulnerability to a denial of service condition where Asterisk segfaults when receiving an INVITE flood over TCP.

http://www.rayongpolice.go.th/bc7.html

Posted by deepcore under defacement (No Respond)

http://www.rayongpolice.go.th/bc7.html notified by BCA-X666X

Tags:

Apple Fixes Three iOS Zero Days Exploited In The Wild

Posted by deepcore under exploit (No Respond)

Amarok 2.8.0 Denial Of Service

Posted by deepcore under exploit (No Respond)

Amarok version 2.8.0 suffers from a denial of service vulnerability.

Trend Micro IMSVA CSRF / XML Injection / SSRF / File Disclosure

Posted by deepcore under exploit (No Respond)

Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) versions prior to 9.1.0 Critical Patch Build 2025 suffer from XML injection, over-privileged access, cross site request forgery, file disclosure, server-side request forgery, information leakage, and various other vulnerabilities.

iDS6 DSSPro Digital Signage System 6.2 Password Disclosure

Posted by deepcore under exploit (No Respond)

iDS6 DSSPro Digital Signage System version 6.2 suffers from a cleartext transmission/storage of sensitive information in a cookie when using the Remember (autoSave=true) feature. This allows a remote attacker to intercept the HTTP Cookie authentication credentials via a man-in-the-middle attack.

iDS6 DSSPro Digital Signage System 6.2 Cross Site Request Forgery

Posted by deepcore under exploit (No Respond)

iDS6 DSSPro Digital Signage System version 6.2 allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.

iDS6 DSSPro Digital Signage System 6.2 CAPTCHA Security Bypass

Posted by deepcore under exploit (No Respond)

The CAPTCHA function for iDS6 DSSPro Digital Signage System version 6.2 is prone to a security bypass vulnerability that occurs in the CAPTCHA authentication routine. By requesting the autoLoginVerifyCode object an attacker can receive a JSON message code and successfully bypass the CAPTCHA-based authentication challenge and perform brute-force attacks.

iDS6 DSSPro Digital Signage System 6.2 Privilege Escalation

Posted by deepcore under exploit (No Respond)

iDS6 DSSPro Digital Signage System version 6.2 suffers from a privilege escalation vulnerability. An authenticated user can elevate his/her privileges by calling JS functions from the console or by insecure direct object references to hidden functionalities that can result in creating users, modifying roles and permissions and full takeover of the application.