Subscribe via feed.
Archive for May, 2022

[webapps] ImpressCMS v1.4.4 – Unrestricted File Upload

Posted by deepcore under Security (No Respond)

ImpressCMS v1.4.4 – Unrestricted File Upload

Tags: ,

[remote] Ruijie Reyee Mesh Router – Remote Code Execution (RCE) (Authenticated)

Posted by deepcore under Security (No Respond)

Ruijie Reyee Mesh Router – Remote Code Execution (RCE) (Authenticated)

Tags: ,

[remote] DLINK DIR850 – Insecure Access Control

Posted by deepcore under Security (No Respond)

DLINK DIR850 – Insecure Access Control

Tags: ,

[remote] SAP BusinessObjects Intelligence 4.3 – XML External Entity (XXE)

Posted by deepcore under Security (No Respond)

SAP BusinessObjects Intelligence 4.3 – XML External Entity (XXE)

Tags: ,

[local] TCQ – ITeCProteccioAppServer.exe – Unquoted Service Path

Posted by deepcore under Security (No Respond)

TCQ – ITeCProteccioAppServer.exe – Unquoted Service Path

Tags: ,

Printix 1.3.1106.0 Privileged API Abuse

Posted by deepcore under exploit (No Respond)

An “Incorrect Use of a Privileged API” vulnerability in PrintixService.exe in Printix’s “Printix Secure Cloud Print Management” versions 1.3.1106.0 and below allows a local or remote attacker the ability change all HKEY Windows Registry values as SYSTEM context via the UITasks.PersistentRegistryData parameter.

Ransom.Cryakl Code Execution

Posted by deepcore under exploit (No Respond)

Cryakl ransomware looks for and loads a DLL named “wow64log.dll” in WindowsSystem32. Therefore, we can drop our own DLL to intercept and terminate the malware pre-encryption. The exploit DLL will simply display a Win32API message box and call exit(). The exploit DLL must export the “InterlockedExchange” function or it fails with an error. We do […]

Ransom.Petya Code Execution

Posted by deepcore under exploit (No Respond)

Petya ransomware looks for and loads a DLL named “wow64log.dll” in WindowsSystem32. Therefore, we can drop our own DLL to intercept and terminate the malware pre-encryption. The exploit DLL will simply display a Win32API message box and call exit(). The exploit DLL must export the “InterlockedExchange” function or it fails with an error. We do […]

Travel Management System 1.0 SQL Injection

Posted by deepcore under exploit (No Respond)

Travel Management System version 1.0 suffers from multiple remote SQL injection vulnerabilities. Original discovery of SQL injection in this version is attributed to Bobby Cooke and hyd3sec in August of 2020.

School Dormitory Management 1.0 SQL Injection

Posted by deepcore under exploit (No Respond)

School Dormitory Management version 1.0 suffers from a remote SQL injection vulnerability.