mo

IQrouter 3.3.1 Remote Code Execution

IQrouter firmware version 3.3.1 suffers from a remote code execution vulnerability.




mo

NSClient++ 0.5.2.35 Authenticated Remote Code Execution

NSClient++ version 0.5.2.35 suffers from an authenticated remote code execution vulnerability.




mo

Edimax EW-7438RPn 1.13 Remote Code Execution

Edimax EW-7438RPn version 1.13 suffers from a remote code execution vulnerability.




mo

Furukawa Electric ConsciusMAP 2.8.1 Java Deserialization Remote Code Execution

Furukawa Electric ConsciusMAP version 2.8.1 java deserialization remote code execution exploit.




mo

School ERP Pro 1.0 Remote Code Execution

School ERP Pro version 1.0 suffers from a remote code execution vulnerability.




mo

Open-AudIT Professional 3.3.1 Remote Code Execution

Open-AudIT Professional version 3.3.1 suffers from a remote code execution vulnerability.




mo

SimplePHPGal 0.7 Remote File Inclusion

SimplePHPGal version 0.7 suffers from a remote file inclusion vulnerability.




mo

Saltstack 3000.1 Remote Code Execution

Saltstack version 3000.1 suffers from a remote code execution vulnerability.




mo

ManageEngine Asset Explorer Windows Agent Remote Code Execution

The ManageEngine Asset Explorer windows agent suffers form a remote code execution vulnerability. All versions prior to 1.0.29 are affected.




mo

Telegram DDoS Attack Launched Mostly From China




mo

Suspected Commonwealth Games DDoS Was Only A Fortnite Update




mo

Anonymous Hacker Gets 6 Years For Some Lame DDoS Attacks





mo

Swift File Transfer Mobile Cross Site Scripting / Information Disclosure

The Swift File Transfer mobile application for ios, blackberry and android suffers from cross site scripting and information disclosure vulnerabilities.




mo

Cisco UCS Director Unauthenticated Remote Code Execution

The Cisco UCS Director virtual appliance contains two flaws that can be combined and abused by an attacker to achieve remote code execution as root. The first one, CVE-2019-1937, is an authentication bypass, that allows the attacker to authenticate as an administrator. The second one, CVE-2019-1936, is a command injection in a password change form, that allows the attacker to inject commands that will execute as root. This module combines both vulnerabilities to achieve the unauthenticated command injection as root. It has been tested with Cisco UCS Director virtual machines 6.6.0 and 6.7.0. Note that Cisco also mentions in their advisory that their IMC Supervisor and UCS Director Express are also affected by these vulnerabilities, but this module was not tested with those products.




mo

Cisco Content Security Virtual Appliance M380 IronPort Remote Cross Site Host Modification

Cisco Content Security Virtual Appliance M380 IronPort remote cross site host modification demo exploit.




mo

Cisco Discovery Protocol (CDP) Remote Device Takeover

Armis has discovered five critical, zero-day vulnerabilities in various implementations of the Cisco Discovery Protocol (CDP) that can allow remote attackers to completely take over devices.




mo

Cisco Data Center Network Manager 11.2 Remote Code Execution

Cisco Data Center Network Manager version 11.2 remote code execution exploit.




mo

Cisco AnyConnect Secure Mobility Client 4.8.01090 Privilege Escalation

Cisco AnyConnect Secure Mobility Client for Windows version 4.8.01090 suffer from a privilege escalation vulnerability due to insecure handling of path names.




mo

Qualys Security Advisory - GNU C Library Memory Leak / Buffer Overflow

Qualys has discovered a memory leak and a buffer overflow in the dynamic loader (ld.so) of the GNU C Library (glibc).




mo

GNU Barcode 0.99 Memory Leak

GNU Barcode version 0.99 suffers from a memory leak vulnerability.




mo

ImageMagick Memory Leak

ImageMagick versions prior to 7.0.8-9 suffers from a memory leak vulnerability.




mo

LibTIFF 4.0.8 Memory Leak

LibTIFF version 4.0.8 suffers from multiple memory leak vulnerabilities.




mo

KVM kvm_inject_page_fault Uninitialized Memory Leak

KVM suffers from an uninitialized memory leak vulnerability in kvm_inject_page_fault.




mo

Nanometrics Centaur / TitanSMA Unauthenticated Remote Memory Leak

An information disclosure vulnerability exists when Centaur and TitanSMA fail to properly protect critical system logs such as 'syslog'. Additionally, the implemented Jetty version (9.4.z-SNAPSHOT) suffers from a memory leak of shared buffers that was (supposedly) patched in Jetty version 9.2.9.v20150224.




mo

Nanometrics Centaur 4.3.23 Memory Leak

Nanometrics Centaur version 4.3.23 suffers from an unauthenticated remote memory leak vulnerability.




mo

IRIX Local Kernel Memory Disclosure / Denial Of Service

IRIX suffers from local kernel memory disclosure and denial of service vulnerabilities.




mo

GitLab Awards Researcher $20,000 For Remote Code Execution Bug




mo

PalmOShttpd.txt

A bug exists in the PalmOS httpd that causes a crash with a "Fatal Error". Full exploit included.




mo

NanoCore Trojan Is Protected In Memory From Being Killed Off





mo

CA Common Services casrvc Privilege Escalation

CA Technologies support is alerting customers about a medium risk vulnerability that may allow a local attacker to gain additional privileges with products using CA Common Services running on the AIX, HP-UX, Linux, and Solaris platforms. The vulnerability, CVE-2016-9795, occurs due to insufficient validation by the casrvc program. A local unprivileged user can exploit the vulnerability to modify arbitrary files, which can potentially allow a local attacker to gain root level access.





mo

PHP imap_open Remote Code Execution

The imap_open function within PHP, if called without the /norsh flag, will attempt to preauthenticate an IMAP session. On Debian based systems, including Ubuntu, rsh is mapped to the ssh binary. Ssh's ProxyCommand option can be passed from imap_open to execute arbitrary commands. While many custom applications may use imap_open, this exploit works against the following applications: e107 v2, prestashop, SuiteCRM, as well as Custom, which simply prints the exploit strings for use. Prestashop exploitation requires the admin URI, and administrator credentials. suiteCRM/e107/hostcms require administrator credentials.




mo

Nagios XI Authenticated Remote Command Execution

This Metasploit module exploits a vulnerability in Nagios XI versions before 5.6.6 in order to execute arbitrary commands as root. The module uploads a malicious plugin to the Nagios XI server and then executes this plugin by issuing an HTTP GET request to download a system profile from the server. For all supported targets except Linux (cmd), the module uses a command stager to write the exploit to the target via the malicious plugin. This may not work if Nagios XI is running in a restricted Unix environment, so in that case the target must be set to Linux (cmd). The module then writes the payload to the malicious plugin while avoiding commands that may not be supported. Valid credentials for a user with administrative privileges are required. This module was successfully tested on Nagios XI 5.6.5 running on CentOS 7. The module may behave differently against older versions of Nagios XI.




mo

Mobile Security Framework MobSF 0.9.2 Beta

Mobile Security Framework (MobSF) is an all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static and dynamic analysis. It can be used for effective and fast security analysis of Android and iOS Applications and supports both binaries (APK & IPA) and zipped source code. MobSF can also do Web API Security testing with it's API Fuzzer that performs Information Gathering, analyze Security Headers, identify Mobile API specific vulnerabilities like XXE, SSRF, Path Traversal, IDOR, and other logical issues related to Session Management and API Rate Limiting.




mo

Mobile Security Framework MobSF 0.9.3 Beta

Mobile Security Framework (MobSF) is an all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static and dynamic analysis. It can be used for effective and fast security analysis of Android and iOS Applications and supports both binaries (APK & IPA) and zipped source code. MobSF can also do Web API Security testing with it's API Fuzzer that performs Information Gathering, analyze Security Headers, identify Mobile API specific vulnerabilities like XXE, SSRF, Path Traversal, IDOR, and other logical issues related to Session Management and API Rate Limiting.




mo

Building A Simple Proxy Fuzzer For THe MQTT Protocol Using The Polymorph Framework

Whitepaper that shows how easy you can build a fuzzer for the MQTT protocol by using the Polymorph framework.






mo

HPP Protection Patch For ModSecurity 2.5.9

HPP (HTTP Parameter Pollution) protection patch for ModSecurity version 2.5.9.








mo

Samsung Android Remote Code Execution

Samsung Android suffers from multiple interaction-less remote code execution vulnerabilities as well as other remote access issues in the Qmage image codec built into Skia.