While auditing the Teamspeak 3 server I’ve discovered several 0-day
vulnerabilities which I’ll describe in detail in this advisory. They exist in
the newest version of the server, version 3.0.13.
I found 10 vulnerabilities. Some of these are critical and allow remote code
execution. For the average user, that means that these vulnerabilities can be
exploited by a malicious attacker in order to take over any Teamspeak server,
not only…
As, of, today, my, blog – http://ddanchev.blogspot.com is going, private, and, I, decided, to, let, everyone, know, on,
how, to, request, access, to, continue, to, maintain, access, to, the, blog.
RCE, file download, weak encryption and user impersonation, all of which
can be exploited by an unauthenticated attacker in WebNMS Framework 5.2
and 5.2 SP1.
vBulletin software is affected by a SSRF vulnerability that allows
unauthenticated remote attackers to access internal services (such as mail
servers, memcached, couchDB, zabbix etc.) running on the server
hosting vBulletin as well as services on other servers on the local
network that are accessible from the target.
several of Microsoft’s Sysinternals utilities extract executables
to %TEMP% and run them from there; the extracted executables are
vulnerable to DLL hijacking, allowing arbitrary code execution in
every user account and escalation of privilege in “protected
administrator” accounts [*].
* CoreInfo.exe:
extracts on x64 an embedded CoreInfo64.exe to %TEMP% which loads
%TEMP%VERSION.DLL (on Windows Vista and newer)…