Subscribe via feed.
Archive for June, 2022

http://yala.nfe.go.th/betong/web1/file_editor/0x.txt

Posted by deepcore under defacement (No Respond)

http://yala.nfe.go.th/betong/web1/file_editor/0x.txt notified by L4663R666H05T

Tags:

http://phuket.nfe.go.th/kathu/web1/file_editor/0x.txt

Posted by deepcore under defacement (No Respond)

http://phuket.nfe.go.th/kathu/web1/file_editor/0x.txt notified by L4663R666H05T

Tags:

GtkRadiant 1.6.6 Buffer Overflow

Posted by deepcore under exploit (No Respond)

GtkRadiant version 1.6.6 suffers from a buffer overflow vulnerability.

Microsoft Releases Workaround For 1-Click 0-Day Under Active Attack

Posted by deepcore under exploit (No Respond)

Fast Food Ordering System 1.0 Cross Site Scripting

Posted by deepcore under exploit (No Respond)

Fast Food Ordering System version 1.0 suffers from a persistent cross site scripting vulnerability.

Microsoft Follina Proof Of Concept

Posted by deepcore under exploit (No Respond)

Proof of concept exploit for the Microsoft Windows Support Diagnostic Tool (MSDT) remote code execution vulnerability dubbed Follina.

Microsoft Office MSDT Follina Proof Of Concept

Posted by deepcore under exploit (No Respond)

Proof of concept for the remote code execution vulnerability in MSDT known as Follina.

MyBB Admin Control Remote Code Execution

Posted by deepcore under exploit (No Respond)

This Metasploit module exploits an improper input validation vulnerability in MyBB versions prior to 1.8.30 to execute arbitrary code in the context of the user running the application. The MyBB Admin Control setting page calls the PHP eval function with unsanitized user input. The exploit adds a new setting, injecting the payload in the vulnerable […]

MyBB Admin Control Remote Code Execution

Posted by deepcore under exploit (No Respond)

This Metasploit module exploits an improper input validation vulnerability in MyBB versions prior to 1.8.30 to execute arbitrary code in the context of the user running the application. The MyBB Admin Control setting page calls the PHP eval function with unsanitized user input. The exploit adds a new setting, injecting the payload in the vulnerable […]