Subscribe via feed.
Archive for May, 2022

Ransom.Conti MVID-2022-0601 Code Execution

Posted by deepcore under exploit (No Respond)

Conti ransomware looks for and executes DLLs in its current directory. Therefore, we can potentially hijack a DLL to execute our own code and control and terminate the malware pre-encryption. The exploit dll will check if the current directory is “C:WindowsSystem32” and if not we grab our process ID and terminate. We do not need […]

Ransom.Conti MVID-2022-0602 Code Execution

Posted by deepcore under exploit (No Respond)

Conti ransomware looks for and executes DLLs in its current directory. Therefore, we can potentially hijack a DLL to execute our own code and control and terminate the malware pre-encryption. The exploit dll will check if the current directory is “C:WindowsSystem32” and if not we grab our process ID and terminate. We do not need […]

Ransom.Conti MVID-2022-0603 Code Execution

Posted by deepcore under exploit (No Respond)

Conti ransomware looks for and executes DLLs in its current directory. Therefore, we can potentially hijack a DLL to execute our own code and control and terminate the malware pre-encryption. The exploit dll will check if the current directory is “C:WindowsSystem32” and if not we grab our process ID and terminate. We do not need […]

HighCMS/HighPortal 12.x SQL Injection

Posted by deepcore under exploit (No Respond)

HighCMS/HighPortal version 12.x appears to suffer from a remote SQL injection vulnerability.

Ransom.Conti MVID-2022-0604 Code Execution

Posted by deepcore under exploit (No Respond)

Conti ransomware looks for and executes DLLs in its current directory. Therefore, we can potentially hijack a DLL to execute our own code and control and terminate the malware pre-encryption. The exploit dll will check if the current directory is “C:WindowsSystem32” and if not we grab our process ID and terminate. We do not need […]

WordPress WP Event Manager 3.1.27 Cross Site Scripting

Posted by deepcore under exploit (No Respond)

WordPress WP Event Manager plugin version 3.1.27 suffers from a persistent cross site scripting vulnerability.

Ransom.Conti MVID-2022-0605 Code Execution

Posted by deepcore under exploit (No Respond)

Conti ransomware looks for and executes DLLs in its current directory. Therefore, we can potentially hijack a DLL to execute our own code and control and terminate the malware pre-encryption. The exploit dll will check if the current directory is “C:WindowsSystem32” and if not we grab our process ID and terminate. We do not need […]

Zyxel Remote Command Execution

Posted by deepcore under exploit (No Respond)

Victorian Machinery is a proof of concept exploit for CVE-2022-30525. The vulnerability is an unauthenticated and remote command injection vulnerability affecting Zyxel firewall’s that support zero touch provisioning. Zyxel pushed a fix for this issue on April 28, 2022. Multiple models are affected.

Ransom.Conti MVID-2022-0606 Code Execution

Posted by deepcore under exploit (No Respond)

Conti ransomware looks for and executes DLLs in its current directory. Therefore, we can potentially hijack a DLL to execute our own code and control and terminate the malware pre-encryption. The exploit dll will check if the current directory is “C:WindowsSystem32” and if not we grab our process ID and terminate. We do not need […]

IpMatcher 1.0.4.1 Server-Side Request Forgery

Posted by deepcore under exploit (No Respond)

IpMatcher versions 1.0.4.1 and below for .NET Core 2.0 and .NET Framework 4.5.2 incorrectly validates octal and hexadecimal input data which can lead to indeterminate server-side request forgery, local file inclusion, remote file inclusion, and denial of service vectors.