Для нормальной работы сайта необходимо разрешить JavaScript, включая скрипты с доменов googlesyndication.com и doubleclick.net для отображения системы поиска по сайту и прочих сервисов Google.

PS Exploit News

Packet Storm - Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
  1. Afian AB FileRun 2017.03.18 CSRF / Shell Upload / XSS / Redirection

    Afian AB FileRun version 2017.03.18 suffers from cross site request forgery, cross site scripting, open redirection, remote shell upload, and various other vulnerabilities.
  2. Linksys E Series CSRF / XSS / Denial Of Service / Header Injection

    Linksys E series devices suffer from cross site request forgery, cross site scripting, header injection, denial of service, and various other vulnerabilities.
  3. Webtrekk Pixel Tracking Cross Site Scripting

    Webtrekk Pixel Track versions 3.24 to 3.40, 4.00 to 4.40, and 5.00 to 5.04 suffer from a cross site scripting vulnerability.
  4. 3CX Phone System 15.5.3554.1 Directory Traversal

    3CX Phone System version 15.5.3554.1 suffers from an authentication directory traversal vulnerability.
  5. Windows Kernel Pool nt!NtQueryObject Memory Disclosure

    It was discovered that the nt!NtQueryObject syscall handler discloses portions of uninitialized pool memory to user-mode clients when certain conditions are met.
  6. Micro Focus VisiBroker C++ 8.5 SP2 Memory Corruption

    Micro Focus VisiBroker C++ version 8.5 SP2 suffers from multiple memory corruption vulnerabilities.
  7. Webmin 1.850 SSRF / CSRF / Cross Site Scripting / Command Execution

    Webmin version 1.850 suffers from server side request forgery, cross site request forgery, and cross site scripting vulnerabilities, the last of which can lead to remote command execution.
  8. WordPress Influencer Marketing And Press Release System 2.2 XSS

    WordPress Influencer Marketing and Press Release System plugin version 2.2 suffers from a cross site scripting vulnerability.
  9. Microsoft Edge Chakra StackScriptFunction::BoxState::Box Uninitialized Pointers

    Microsoft Edge Chakra accesses uninitialized pointers in StackScriptFunction::BoxState::Box.
  10. Microsoft Edge Chakra JIT Failed RegexHelper::StringReplace Call

    The "String.prototype.replace" method can be inlined in the JIT process. So in the method, all the calls which may break the JIT assumptions must be invoked with updating "ImplicitCallFlags". But "RegexHelper::StringReplace" calls the replace function without updating the flag. Therefore it fails to detect if a user function was called.
  11. Microsoft Edge Chakra JIT Incorrect GenerateBailOut Calling Patterns

    Microsoft Edge Chakra JIT compiler creates incorrect GenerateBailOut calling patterns.
  12. Microsoft Windows WLDP/MSHTML CLSID UMCI Bypass

    The enlightened lockdown policy check for COM Class instantiation can be bypassed in MSHTML hosts leading to arbitrary code execution on a system with UMCI enabled (e.g. Device Guard).
  13. Shadowsocks-libev 3.1.0 Command Execution

    Shadowsocks-libev version 3.1.0 suffers from a remote command execution vulnerability.
  14. Shadowsocks Log Manipulation / Command Execution

    Several issues have been identified, which allow attackers to manipulate log files, execute commands and to brute force Shadowsocks with enabled autoban.py brute force detection. Brute force detection from autoban.py does not work with suggested tail command. The key of captured Shadowsocks traffic can be brute forced. The latest commit 2ab8c6b on Sep 6, 2017 is affected.
  15. AlienVault USM 5.4.2 Cross Site Request Forgery

    AlienVault USM version 5.4.2 suffers from a cross site request forgery vulnerability.
  16. Opentext Documentum Content Server File Hijack / Privilege Escalation

    Opentext Documentum Content Server (formerly known as EMC Documentum Content Server) does not properly validate input of the PUT_FILE RPC command which allows any authenticated user to hijack arbitrary file from the Content Server filesystem. Because some files on the Content Server filesystem are security-sensitive this security flaw leads to privilege escalation.
  17. Opentext Documentum Content Server Privilege Escalation

    Opentext Documentum Content Server (formerly known as EMC Documentum Content Server) contains a design gap that allows any authenticated user the ability to replace content of security-sensitive dmr_content objects (for example, dmr_content related to dm_method objects) and gain superuser privileges.
  18. Opentext Documentum Content Server File Download

    Opentext Documentum Content Server (formerly known as EMC Documentum Content Server) contains a design gap that allows authenticated user to download arbitrary content files regardless of the attacker's repository permissions.
  19. Opentext Documentum Content Server Privilege Escalation

    Opentext Documentum Content Server (formerly known as EMC Documentum Content Server) allows for privilege escalation via traversal attacks leveraged through uploaded tar files.
  20. Quick CMS 6.4 SQL Injection / Authentication Bypass

    Quick CMS version 6.4 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
  21. DuckieTV CMS 1.1.5 Local File Inclusion

    DuckieTV CMS version 1.1.5 suffers from a local file inclusion vulnerability.
  22. E-Sic Software livre CMS 1.0 Cross Site Scripting / SQL Injection

    E-Sic Software livre CMS version 1.0 suffers from authentication bypass, cross site scripting, and remote SQL injection vulnerabilities.
  23. phpMyFAQ 2.9.8 Cross Site Scripting

    phpMyFAQ version 2.9.8 suffers from a persistent cross site scripting vulnerability where an attacker can embed malicious script code in the title of the faq.
  24. SyncBreeze 10.1.16 SEH GET Overflow

    There exists an unauthenticated SEH based vulnerability in the HTTP server of Sync Breeze Enterprise version 10.1.16, when sending a GET request with an excessive length it is possible for a malicious user to overwrite the SEH record and execute a payload that would run under the Windows NT AUTHORITY\SYSTEM account. The SEH record is overwritten with a "POP,POP,RET" pointer from the application library libspp.dll. This exploit has been successfully tested on Windows XP, 7 and 10 (x86->x64). It should work against all versions of Windows and service packs.
  25. Typo3 Restler 1.7.0 Local File Disclosure

    Typo3 Restler extension version 1.7.0 suffers from a local file disclosure vulnerability.
2 megabytes