This update contains improvements to our agents to reduce detection rates against some antiviruses.
Mimikatz module enhancement for non-ASCII characters.
The specific flaw exists within the edit_lf_process resource of the Reprise License Manager service. The issue lies in the ability to write arbitrary files with controlled data. An attacker could leverage this vulnerability to execute arbitrary code under the context of SYSTEM.
This update specify information about vulnerable targets and add more targets.
This update specify information about vulnerable targets and add more targets.
ManageEngine OpManager is vulnerable to abuse a SQL query functionality that allows attackers to insert and export a crafted WAR using 'IntegrationUser' hidden account credentials allowing us to install an agent.
The specific flaw exists within OmniInet.exe which listens by default on TCP port 5555. When parsing a malformed user name field in a request, the process blindly copies user supplied data into a fixed-length stack buffer. A remote attacker can abuse this to execute remote code under the context of SYSTEM.
This update resolves an error that can occur using Excel file.
This update resolves an issue with displaying certain vulnerabilities in the Quick Information view.
The specific flaw exists within the edit_lf_process resource of the AccuRev Reprise License Manager service. The issue lies in the ability to write arbitrary files with controlled data. An attacker could leverage this vulnerability to execute arbitrary code under the context of SYSTEM.
This update introduces more accurate information about vulnerable targets.
This update introduces more accurate information about vulnerable targets.
The specific flaw exists within the activate_doit function of the service. The issue lies in the handling of the server parameter which can result in overflowing a stack-based buffer.
This update introduces more accurate information about vulnerable targets.
This update introduces more accurate information about vulnerable targets.
Atlassian Bamboo is prone to a remote vulnerability that allows attackers to take advantage of a deserialization vulnerability present in the commons-collections Java library.
By exploiting known methods, it is possible to remotely load a InvokerTransformer Java class, which allows the execution of system commands.
By exploiting known methods, it is possible to remotely load a InvokerTransformer Java class, which allows the execution of system commands.
Pagination
- Previous page
- Page 18
- Next page