ess

WordPress WooCommerce CardGate Payment Gateway 3.1.15 Bypass

WordPress WooCommerce CardGate Payment Gateway plugin version 3.1.15 suffers from a payment process bypass vulnerability.




ess

Intelbras Wireless N 150Mbps WRN240 Authentication Bypass

Intelbras Wireless N 150Mbps WRN240 suffers from a configuration upload authentication bypass vulnerability.




ess

File Explorer 1.4 Access Bypass

File Explorer for iOS version 1.4 suffers from an access bypass vulnerability.





ess

WordPress WooCommerce Advanced Order Export 3.1.3 Cross Site Scripting

WordPress WooCommerce Advanced Order Export plugin version 3.1.3 suffers from a cross site scripting vulnerability.




ess

WordPress Dosimple Theme 2.0 Cross Site Scripting

WordPress Dosimple theme version 2.0 suffers from a cross site scripting vulnerability.







ess

Juniper Secure Access Cross Site Scripting

Juniper Secure Access suffers from a cross site scripting vulnerability. SA Appliances running Juniper IVE OS 6.0 or higher are affected.




ess

Juniper Secure Access Cross Site Scripting

Juniper Secure Access software suffers from a reflective cross site scripting vulnerability.




ess

Juniper Secure Access SSL VPN Privilege Escalation

Certain Secure Access SA Series SSL VPN products (originally developed by Juniper Networks but now sold and supported by Pulse Secure, LLC) allow privilege escalation, as demonstrated by Secure Access SSL VPN SA-4000 5.1R5 (build 9627) 4.2 Release (build 7631). This occurs because appropriate controls are not performed.





ess

Microsoft Internet Explorer COALineDashStyleArray Unsafe Memory Access

This Metasploit module exploits a vulnerability on Microsoft Silverlight. The vulnerability exists on the Initialize() method from System.Windows.Browser.ScriptObject, which access memory in an unsafe manner. Since it is accessible for untrusted code (user controlled) it's possible to dereference arbitrary memory which easily leverages to arbitrary code execution. In order to bypass DEP/ASLR a second vulnerability is used, in the public WriteableBitmap class from System.Windows.dll. This Metasploit module has been tested successfully on IE6 - IE10, Windows XP SP3 / Windows 7 SP1 on both x32 and x64 architectures.




ess

WordPress Media Library Assistant 2.81 Local File Inclusion

WordPress Media Library Assistant plugin version 2.81 suffers from a local file inclusion vulnerability.




ess

Microsoft Windows 10 User Sessions Stuck

This exploit modifies a windows language registry key which causes some windows binaries to stick, including login which makes the session unusable. The key is in HKCU and can be modified without admin rights, but with a bypass UAC, all user sessions can be paralyzed by using reg.exe and user's NTUSER.DAT.




ess

Microsoft Windows .Reg File / Dialog Box Message Spoofing

The Windows registry editor allows specially crafted .reg filenames to spoof the default registry dialog warning box presented to an end user. This can potentially trick unsavvy users into choosing the wrong selection shown on the dialog box. Furthermore, we can deny the registry editor its ability to show the default secondary status dialog box (Win 10), thereby hiding the fact that our attack was successful.




ess

VMware Host VMX Process COM Class Hijack Privilege Escalation

The VMX process (vmware-vmx.exe) process configures and hosts an instance of VM. As is common with desktop virtualization platforms the VM host usually has privileged access into the OS such as mapping physical memory which represents a security risk. To mitigate this the VMX process is created with an elevated integrity level by the authentication daemon (vmware-authd.exe) which runs at SYSTEM. This prevents a non-administrator user opening the process and abusing its elevated access. Unfortunately the process is created as the desktop user which results in the elevated process sharing resources such as COM registrations with the normal user who can modify the registry to force an arbitrary DLL to be loaded into the VMX process. Affects VMware Workstation Windows version 14.1.5 (on Windows 10). Also tested on VMware Player version 15.




ess

Open-AudIT Professional 3.3.1 Remote Code Execution

Open-AudIT Professional version 3.3.1 suffers from a remote code execution vulnerability.




ess

LastPass Stores Passwords So Securely Users Cannot Access Them




ess

Cisco Unified Contact Center Express Privilege Escalation

Cisco Unified Contact Center Express suffers from a privilege escalation vulnerability.











ess

Windows Mobile 6.5 MessageBox Shellcode

Windows Mobile version 6.5 TR (WinCE 5.2) MessageBox shellcode for ARM.




ess

NtUserCheckAccessForIntegrityLevel Use-After-Free Vulnerability

Microsoft Windows Vista / Server 2008 suffer from a NtUserCheckAccessForIntegrityLevel use-after-free vulnerability.











ess

SMBv3 Compression Buffer Overflow

A vulnerability exists within the Microsoft Server Message Block 3.1.1 (SMBv3) protocol that can be leveraged to execute code on a vulnerable server. This local exploit implementation leverages this flaw to elevate itself before injecting a payload into winlogon.exe.




ess

addressbook 9.0.0.1 SQL Injection

addressbook version 9.0.0.1 suffers from a remote SQL injection vulnerability.




ess

WordPress ChopSlider 3 SQL Injection

WordPress ChopSlider plugin version 3 suffers from a remote SQL injection vulnerability.




ess

FreeBSD Bug Grants Local Root Access




ess

FreeBSD Bug Gives Untrusted Root Access