What is a JSON feed? Learn more

JSON Feed Viewer

Browse through the showcased feeds, or enter a feed URL below.

Now supporting RSS and Atom feeds thanks to Andrew Chilton's feed2json.org service

CURRENT FEED

Full Disclosure

A public, vendor-neutral forum for detailed discussion of vulnerabilities and exploitation techniques, as well as tools, papers, news, and events of interest to the community. The relaxed atmosphere of this quirky list provides some comic relief and certain industry gossip. More importantly, fresh vulnerabilities sometimes hit this list many hours or days before they pass through the Bugtraq moderation queue.

XML


Bolt CMS <= 3.7.0 Multiple Vulnerabilities - CSRF to RCE

Permalink - Posted on 2020-07-03 17:02

Posted by Sivanesh Ashok on Jul 03

##########################################################################
# Bolt CMS <= 3.7.0 Multiple Vulnerabilities #
##########################################################################

Author - Sivanesh Ashok | @sivaneshashok | stazot.com

Date : 2020-03-24
Vendor : https://bolt.cm/
Version : <= 3.7.0
CVE : CVE-2020-4040, CVE-2020-4041
Last Modified: 2020-07-03

--[ Table...


[SYSS-2020-011] Apple iOS - Exposure of Resource to Wrong Sphere (CWE-668)

Permalink - Posted on 2020-07-03 17:01

Posted by Philipp Buchegger on Jul 03

Advisory ID: SYSS-2020-011
Product: Apple iOS
Manufacturer: Apple Inc.
Affected Version(s): 13.3.1, 13.5.1
Tested Version(s): 13.3.1, 13.5.1
Vulnerability Type: Exposure of Resource to Wrong Sphere (CWE-668)
Risk Level: Medium
Solution Status: Open
Manufacturer Notification: 2020-03-23
Solution Date: -
Public Disclosure: 2020-07-02
CVE Reference: Not yet assigned
Author of Advisory: Philipp Buchegger, SySS GmbH...


[CVE-2020-11882] o2 Business for Android "canvasm.myo2.SplashActivity" <= 1.2.0 Open Redirect

Permalink - Posted on 2020-07-03 17:00

Posted by Julien Ahrens (RCE Security) on Jul 03

RCE Security Advisory
https://www.rcesecurity.com

1. ADVISORY INFORMATION
=======================
Product: o2 Business for Android
Vendor URL: https://play.google.com/store/apps/details?id=telefonica.de.o2business
Type: Open Redirect [CWE-601]
Date found: 2020-04-16
Date published: 2020-07-01
CVSSv3 Score: 3.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)
CVE: CVE-2020-11882

2. CREDITS
==========
This...


CVE-2019-19935 - DOM XSS in Froala WYSIWYG HTML Editor

Permalink - Posted on 2020-07-03 17:00

Posted by Advisories on Jul 03

#############################################################
#
# COMPASS SECURITY ADVISORY
# https://www.compass-security.com/research/advisories/
#
#############################################################
#
# Product: Froala WYSIWYG HTML Editor
# Vendor: Froala
# CSNC ID: CSNC-2020-004
# CVE ID: CVE-2019-19935
# Subject: DOM XSS in Froala WYSIWYG HTML Editor
# Severity: Medium
# Effect: Remotely exploitable
# Author: Emanuel...


SEC Consult SA-20200701-0 :: Reflected Cross-Site Scripting (XSS) in EQDKP Plus CMS

Permalink - Posted on 2020-07-01 16:40

Posted by SEC Consult Vulnerability Lab on Jul 01

SEC Consult Vulnerability Lab Security Advisory < 20200701-0 >
=======================================================================
title: Reflected Cross-Site Scripting (XSS) Vulnerability
product: EQDKP Plus CMS
vulnerable version: <= 2.3.29
fixed version: 2.3.30
CVE number: -
impact: Low
homepage: https://eqdkp-plus.eu/
found: 2020-04-01...


[KIS-2020-08] openSIS <= 7.4 Multiple SQL Injection Vulnerabilities

Permalink - Posted on 2020-06-30 13:27

Posted by Egidio Romano on Jun 30

-----------------------------------------------------
openSIS <= 7.4 Multiple SQL Injection Vulnerabilities
-----------------------------------------------------

[-] Software Link:

https://opensis.com/

[-] Affected Versions:

Version 7.4 and prior versions.

[-] Vulnerabilities Description:

The application is affected by multiple SQL Injection vulnerabilities,
following are some examples:

1) User input passed through the...


[KIS-2020-07] openSIS <= 7.4 (Bottom.php) Local File Inclusion Vulnerability

Permalink - Posted on 2020-06-30 13:25

Posted by Egidio Romano on Jun 30

--------------------------------------------------------------
openSIS <= 7.4 (Bottom.php) Local File Inclusion Vulnerability
--------------------------------------------------------------

[-] Software Link:

https://opensis.com/

[-] Affected Versions:

Version 7.4 and prior versions.

[-] Vulnerability Description:

The vulnerable code is located in the /Bottom.php script:

36....


[KIS-2020-06] openSIS <= 7.4 Incorrect Access Control Vulnerabilities

Permalink - Posted on 2020-06-30 13:25

Posted by Egidio Romano on Jun 30

-------------------------------------------------------
openSIS <= 7.4 Incorrect Access Control Vulnerabilities
-------------------------------------------------------

[-] Software Link:

https://opensis.com/

[-] Affected Versions:

Version 7.4 and prior versions.

[-] Vulnerabilities Description:

The application prevents unauthenticated access to its functionalities
by including
the 'RedirectIncludes.php',...


KL-001-2020-003 : Cellebrite EPR Decryption Relies on Hardcoded AES Key Material

Permalink - Posted on 2020-06-29 20:48

Posted by KoreLogic Disclosures via Fulldisclosure on Jun 29

KL-001-2020-003 : Cellebrite EPR Decryption Relies on Hardcoded AES Key Material

Title: Cellebrite EPR Decryption Relies on Hardcoded AES Key Material
Advisory ID: KL-001-2020-003
Publication Date: 2020.06.29
Publication URL: https://korelogic.com/Resources/Advisories/KL-001-2020-003.txt

1. Vulnerability Details

     Affected Vendor: Cellebrite
     Affected Product: UFED
     Affected Version: 5.0 - 7.5.0.845
     Platform:...


DLL Hijacking at the Trend Micro Password Manager (CVE-2020–8469)

Permalink - Posted on 2020-06-23 18:33

Posted by Silton Renato Pereira dos Santos on Jun 23

=====[ Tempest Security Intelligence - 2020]==========================

Trend Password Manager
Author: Silton Santos
Tempest Security Intelligence - Recife, Pernambuco - Brazil

=====[ Table of
Contents]=====================================================

* Vulnerability Information
* Overview
* Detailed description
* Thanks & Acknowledgements
* References

=====[ Vulnerability
Information]=============================================

*...


GilaCMS - CVE-2019-13364 CVE-2019-13363

Permalink - Posted on 2020-06-23 18:32

Posted by Rodolfo Augusto do Nascimento Tavares on Jun 23

=====[ Tempest Security Intelligence - ADV-07/2020
]==========================

GilaCMS - Version 1.11.5

Author: Rodolfo Tavares

Tempest Security Intelligence - Recife, Pernambuco - Brazil

=====[ Table of Contents]==================================================
* Overview
* Detailed description
* Timeline of disclosure
* Thanks & Acknowledgements
* References

=====[ Vulnerability...


Keystone Assembler Engine 0.9.2 is out!

Permalink - Posted on 2020-06-23 16:44

Posted by Nguyen Anh Quynh on Jun 23

Greetings,

We are very happy to announce a stable release, version 0.9.2, of
Keystone Assembler Engine!

This version fixes some important bugs inside the core of Keystone,
added some new bindings, and made various improvements, without
breaking compatibility. All users of Keystone are encouraged to
upgrade to v0.9.2.

Find more information on this release at
https://www.keystone-engine.org/Version-0.9.2

(In case you do not know, Keystone is an...


Re: Remote Code Execution in qmail (CVE-2005-1513)

Permalink - Posted on 2020-06-23 16:42

Posted by Qualys Security Advisory on Jun 23

Hi all,

Our Linux exploit for CVE-2005-1513 in qmail is attached to this email.
Alternatively, it will be available at:

https://www.qualys.com/research/security-advisories/

A few notes about this exploit:

- It works as-is against a default, unpatched installation of qmail on
Debian 10 (amd64). It requires roughly 4GB of disk space and 8GB of
memory on the target machine, and creates a file in /tmp when
successful.

- It can be ported to...


[SYSS_2020-014]: ABUS Secvest Wireless Control Device (FUBE50001) - Missing Encryption of Sensitive Data (CWE-311) (CVE-2020-14157)

Permalink - Posted on 2020-06-23 16:37

Posted by Matthias Deeg on Jun 23

Advisory ID: SYSS-2020-014
Product: ABUS Secvest Wireless Control Device (FUBE50001)
Manufacturer: ABUS
Affected Version(s): N/A
Tested Version(s): N/A
Vulnerability Type: Missing Encryption of Sensitive Data (CWE-311)
Risk Level: High
Solution Status: Open
Manufacturer Notification: 2020-04-03
Solution Date: -
Public Disclosure: 2020-06-17
CVE Reference: CVE-2020-14157
Authors of Advisory: Michael Rüttgers, Thomas Detert,...


Pulse Secure Client < 9.1R6 TOCTOU Privilege Escalation (CVE-2020-13162)

Permalink - Posted on 2020-06-16 16:14

Posted by Red Timmy Security on Jun 16

Pulse Secure is recognized among the top 10 Network Access Control (NAC)
vendors by global revenue market share. The componay declares that "80%
of Fortune 500 trust its VPN products by protecting over 20 million
users".

At Red Timmy Security we have discovered that Pulse Secure Client for
Windows suffers of a local privilege escalation vulnerability in the
“PulseSecureService.exe” service. Exploiting this issue allows an...