Subscribe via feed.
Archive for October, 2021

Apple Security Advisory 2021-10-26-9

Posted by deepcore under Apple (No Respond)

Apple Security Advisory 2021-10-26-9 – iOS 15 and iPadOS 15 addresses code execution, denial of service, out of bounds read, spoofing, and use-after-free vulnerabilities.

Tags: , ,

Apple Security Advisory 2021-10-26-10

Posted by deepcore under Apple (No Respond)

Apple Security Advisory 2021-10-26-10 – watchOS 8 addresses bypass, code execution, denial of service, out of bounds read, and use-after-free vulnerabilities.

Tags: , ,

Apple Security Advisory 2021-10-26-11

Posted by deepcore under Apple (No Respond)

Apple Security Advisory 2021-10-26-11 – tvOS 15 addresses bypass, code execution, denial of service, out of bounds read, and use-after-free vulnerabilities.

Tags: , ,

[webapps] Movable Type 7 r.5002 – XMLRPC API OS Command Injection (Metasploit)

Posted by deepcore under Security (No Respond)

Movable Type 7 r.5002 – XMLRPC API OS Command Injection (Metasploit)

Tags: ,

[local] Mini-XML 3.2 – Heap Overflow

Posted by deepcore under Security (No Respond)

Mini-XML 3.2 – Heap Overflow

Tags: ,

[webapps] Movable Type 7 r.5002 – XMLRPC API OS Command Injection (Metasploit)

Posted by deepcore under Security (No Respond)

Movable Type 7 r.5002 – XMLRPC API OS Command Injection (Metasploit)

Tags: ,

[webapps] WebCTRL OEM 6.5 – 'locale' Reflected Cross-Site Scripting (XSS)

Posted by deepcore under Security (No Respond)

WebCTRL OEM 6.5 – ‘locale’ Reflected Cross-Site Scripting (XSS)

Tags: ,

[webapps] Umbraco v8.14.1 – 'baseUrl' SSRF

Posted by deepcore under Security (No Respond)

Umbraco v8.14.1 – ‘baseUrl’ SSRF

Tags: ,

[webapps] Umbraco v8.14.1 – 'baseUrl' SSRF

Posted by deepcore under Security (No Respond)

Umbraco v8.14.1 – ‘baseUrl’ SSRF

Tags: ,

Sophos UTM WebAdmin SID Command Injection

Posted by deepcore under exploit (No Respond)

This Metasploit module exploits an SID-based command injection in Sophos UTM’s WebAdmin interface to execute shell commands as the root user.