Eibiz i-Media Server Digital Signage version 3.8.0 suffers from unauthenticated privilege escalation and arbitrary user creation vulnerability that allows authentication bypass. Once serialized, an AMF encoded object graph may be used to persist and retrieve application state or allow two endpoints to communicate through the exchange of strongly typed data. These objects are received by the server without validation and authentication and gives the attacker the ability to create any user with any role and bypass the security control in place and modify presented data on the screen/billboard.
fd7bb44dd6320c3825c09283301d799e
Eibiz i-Media Server Digital Signage version 3.8.0 is affected by a directory traversal vulnerability. An unauthenticated remote attacker can exploit this to view the contents of files located outside of the server's root directory. The issue can be triggered through the oldfile GET parameter.
48bcb45f0b05d6750b03ec9ce8698dc6
Eibiz i-Media Server Digital Signage version 3.8.0 suffers from an unauthenticated remote privilege escalation and account takeover vulnerability that can be triggered by directly calling the updateUser object (part of ActionScript object graphs), effectively elevating to an administrative role or taking over an existing account by modifying the settings.
3841e73f5ee30c4a0b8a1d02dac070da
Eibiz i-Media Server Digital Signage version 3.8.0 suffers from an unauthenticated configuration disclosure vulnerability.
5d2550faa54b02155ff0c1672fb51b45
Ubuntu Security Notice 4468-1 - Emanuel Almeida discovered that Bind incorrectly handled certain TCP payloads. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. This issue only affected Ubuntu 20.04 LTS. Joseph Gullo discovered that Bind incorrectly handled QNAME minimization when used in certain configurations. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. This issue only affected Ubuntu 20.04 LTS. Various other issues were also addressed.
b7dcb2f5025b482f2cbb92a36354b19b
The handling of KTM logs when initializing a Registry Hive contains no bounds checks which results in privilege escalation.
47cc29fc3f9a4152d374689e8d8dbe44
The handling of KTM logs does not limit Registry Key operations to the loading hive leading to elevation of privilege.
cde9e4062cc05fc18d17cf5eabad623b
10 bytes small Linux/x86 execve "/bin/sh" shellcode.
17eba74611ee88dd5e7b38ff76974d98
35 bytes small Linux/x86 /dev/sda wiping shellcode.
19e25cdfd1453bac178a73395ba04bfa
Seowon SlC 130 Router suffers from a remote code execution vulnerability.
eaead57ab327d6f2b9f26f28dac83033
OX App Suite and OX Documents suffer from access control bypass, cross site scripting, and improper input validation vulnerabilities. Multiple version ranges are affected.
ab797e28a3a58caa12fe105e311a7704
Whitepaper called SMB Enumeration and Exploitation and Hardening.
cc8718ed7411491ef187c07d94471f4a