Red Hat Security Advisory 2020-5493-01 - Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. Issues addressed include code execution and cross site scripting vulnerabilities.
c7ced7e586f7032b34ec7986856038b4
Raysync version 3.3.3.8 suffers form a remote code execution vulnerability.
bad3e5d9ea2541ef745fcd64164c3c25
GitLab version 11.4.7 authenticated remote code execution exploit.
cfce7f1e899f9335100dc5ba40716f85
This Metasploit module exploits CVE-2020-1054, an out of bounds write reachable from DrawIconEx within win32k. The out of bounds write can be used to overwrite the pvbits of a SURFOBJ. By utilizing this vulnerability to execute controlled writes to kernel memory, an attacker can gain arbitrary code execution as the SYSTEM user. This module has been tested against a fully updated Windows 7 x64 SP1. Offsets within the exploit code may need to be adjusted to work with other versions of Windows.
a2dcd90d07d8ceca312311ee5cfc7a43
Gitlab version 11.4.7 authenticated remote code execution exploit.
a36b219bfdec49346a92f4b0b0fb2c32
Online Marriage Registration System version 1.0 authenticated remote code execution exploit. Original discovery of remote code execution in this version was discovered by Selim Enes Karaduman.
b2e2851076deae38beb369428e4efccf
Rukovoditel version 2.6.1 remote code execution exploit that leverages shell upload and local file inclusion vulnerabilities.
e2fa9c797d92a57016481570e269e9e5
Dolibarr version 12.0.3 remote SQL injection exploit that achieves remote code execution.
511f387e8db618560590a52a96f412ec
This Metasploit module provides remote code execution against GitLab Community Edition (CE) and Enterprise Edition (EE). It combines an arbitrary file read to extract the Rails secret_key_base, and gains remote code execution with a deserialization vulnerability of a signed experimentation_subject_id cookie that GitLab uses internally for A/B testing. Note that the arbitrary file read exists in GitLab EE/CE 8.5 and later, and was fixed in 12.9.1, 12.8.8, and 12.7.8. However, the RCE only affects versions 12.4.0 and above when the vulnerable experimentation_subject_id cookie was introduced. Tested on GitLab 12.8.1 and 12.4.0.
9603149ee63599adcc99cffa47a96d86
SmarterMail build version 6985 suffers from a remote code execution vulnerability.
c71b8312e48f7d45d14c777ba15af640
Gentoo Linux Security Advisory 202012-7 - Multiple vulnerabilities have been found in PostgreSQL, the worst of which could result in arbitrary code execution. Versions less than 13.1 are affected.
be19de36dc8efd02ce649046656d99bb
ProCaster LE-32F430 SmartTV remote code execution exploit that leverages a stack overflow vulnerability in GStreamer souphttpsrc libsoup version 2.51.3.
d18a43131bc124fd1e6a92560857602a
Red Hat Security Advisory 2020-5333-01 - Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. Issues addressed include a code execution vulnerability.
20808394681132136538de7d661cdd2f
Online Matrimonial Project version 1.0 authenticated remote code execution exploit.
a96292b2fc8628e5695e9fde160febe4
WordPress WP-FileManager plugin version 6.8 remote code execution exploit.
384a5f15dbfddc6058b64fdb42bd1ce1
WonderCMS version 3.1.3 suffers from an authenticated remote code execution vulnerability.
b444e794ada92a9ef2f96a93a0bbc90c
WonderCMS version 3.1.3 suffers from an authenticated server-side request forgery vulnerability that allows for remote code execution.
693838d6867777ecd7efd98f273c1c06
Red Hat Security Advisory 2020-5275-01 - PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Issues addressed include buffer over-read, buffer overflow, code execution, information leakage, null pointer, and out of bounds read vulnerabilities.
15b6e660f7ec10e7b1caf283b0e647fa
Red Hat Security Advisory 2020-5249-01 - Fixed two jQuery vulnerabilities Improved Ansible Tower's web service configuration to allow for processing more simultaneous HTTP requests by default Updated several dependencies of Ansible Tower's User Interface to address Updated to the latest version of python-psutil to address CVE-2019-18874 Added several optimizations to improve performance for a variety of high-load simultaneous job launch use cases Fixed workflows to no longer prevent certain users from being able to edit approval nodes Fixed confusing behavior for social auth logins across distinct browser tabs Fixed launching of Job Templates that use prompt-at-launch Ansible Vault credentials. Issues addressed include code execution and cross site scripting vulnerabilities.
4eefeaf6b7e349b286bcd7fc4ba67327
Ruckus IoT Controller (Ruckus vRIoT) versions 1.5.1.0.21 and below suffer from a remote code execution vulnerability.
a76ca35e7a3f8b47cc3cd57b5a659c7c
Ubuntu Security Notice 4648-1 - A large number of security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution.
6fe24a2351dd3e1ef847961c9f674d37
Foxit Reader version 9.0.1.1049 suffers from an arbitrary code execution vulnerability. This is a variant exploit of the original finding from 2018.
b950b07ca3d87158ef656845beeaadbc
Seowon 130-SLC router version 1.0.11 suffers from a remote code execution vulnerability.
bfa4fe4c759168816c3ca278f138bd2d
Ubuntu Security Notice 4642-1 - It was discovered that PDFResurrect incorrectly handled certain memory operations during PDF summary generation. An attacker could use this to cause out-of-bounds writes, resulting in a denial of service or arbitrary code execution.
e238caa5145e021e67c028deec6d2611
This Metasploit module exploits a series of vulnerabilities to achieve unauthenticated remote code execution on the Rockwell FactoryTalk View SE SCADA product as the IIS user. The attack relies on the chaining of five separate vulnerabilities. The first vulnerability is an unauthenticated project copy request, the second is a directory traversal, and the third is a race condition. In order to achieve full remote code execution on all targets, two information leak vulnerabilities are also abused. This exploit was used by the Flashback team (Pedro Ribeiro + Radek Domanski) in Pwn2Own Miami 2020 to win the EWS category.
9e09355c37bbe36767252355895d406c