Windows MultiPoint Server 2011 SP1 – RpcEptMapper and Dnschade Local Privilege Escalation
>> TAG: #remote exploit
Mumara Classic 2.93 – ‘license’ SQL Injection (Unauthenticated)
YeaLink SIP-TXXXP 53.84.0.15 – ‘cmd’ Command Injection (Authenticated)
Apache HTTP Server 2.4.50 – Remote Code Execution (RCE) (3)
AbsoluteTelnet 11.24 – ‘Username’ Denial of Service (PoC)
AbsoluteTelnet 11.24 – ‘Phone’ Denial of Service (PoC)
FormaLMS 2.4.4 – Authentication Bypass
Employee Daily Task Management System 1.0 – ‘Name’ Stored Cross-Site Scripting (XSS)
Employee and Visitor Gate Pass Logging System 1.0 – ‘name’ Stored Cross-Site Scripting (XSS)
Kmaleon 1.1.0.205 – ‘tipocomb’ SQL Injection (Authenticated)