exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files from H4rk3nz0

First Active2020-11-02
Last Active2023-07-31
Keeper Security Desktop 16.10.2 / Browser Extension 16.5.4 Password Dumper
Posted Jul 31, 2023
Authored by H4rk3nz0

An issue was discovered in Keeper Password Manager for Desktop version 16.10.2, and the KeeperFill Browser Extensions version 16.5.4, that allows local attackers to gain sensitive information via plaintext password storage in memory after the user is already logged in, and may persist after logout. Note that the vendor disputes this for two reasons - the information is inherently available during a logged-in session when the attacker can read from arbitrary memory locations, and information only remains available after logout because of memory-management limitations of web browsers (not because the Keeper technology itself is retaining the information).

tags | exploit, web, arbitrary, local
advisories | CVE-2023-36266
SHA-256 | 8228457f02b7ab0fd7e392ec8e339789b9e311c048473f4d48761d9c915a58c0
Unified Remote 3.13.0 Remote Code Execution
Posted Apr 6, 2023
Authored by H4rk3nz0

Unified Remote version 3.13.0 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | fb6c987128457e20caf89804fff3405afbd5a7051e4fe6cef3b37fa054caf96c
Remote Control Collection Remote Code Execution
Posted Nov 29, 2022
Authored by h00die, H4rk3nz0 | Site metasploit.com

This Metasploit module utilizes the Remote Control Server's protocol to deploy a payload and run it from the server. Remote Control Collection by Steppschuh version 3.1.1.12 was tested and affected at the time of the module writing.

tags | exploit, remote, protocol
SHA-256 | 8ec54480d8b7f9ded99d2b49657f9832dc3a324e3a72069c93377bd06f3766c0
Remote Mouse 4.110 Remote Code Execution
Posted Oct 5, 2022
Authored by h00die, 0rphon, H4rk3nz0 | Site metasploit.com

This Metasploit module utilizes the Remote Mouse Server by Emote Interactive protocol to deploy a payload and run it from the server. This module will only deploy a payload if the server is set without a password (default). Tested against 4.110, current at the time of module writing.

tags | exploit, remote, protocol
advisories | CVE-2022-3365
SHA-256 | c755856cc22f5c73769a789fca2bba93c17cf5a3be391dbe30fc988e69e8e0bc
WiFi Mouse 1.8.3.4 Remote Code Execution
Posted Sep 26, 2022
Authored by h00die, H4rk3nz0, RedHatAugust | Site metasploit.com

The WiFi Mouse (Mouse Server) from Necta LLC contains an authentication bypass as the authentication is completely implemented entirely on the client side. By utilizing this vulnerability, is possible to open a program on the server (cmd.exe in our case) and type commands that will be executed as the user running WiFi Mouse (Mouse Server), resulting in remote code execution. Tested against versions 1.8.3.4 (current as of module writing) and 1.8.2.3.

tags | exploit, remote, code execution
advisories | CVE-2022-3218
SHA-256 | a1eb49c803eef32a7d3986d02c20457c3afa4cb25fe942b90918d6d5bcceb6e6
Unified Remote Authentication Bypass / Code Execution
Posted Sep 21, 2022
Authored by h00die, H4rk3nz0 | Site metasploit.com

This Metasploit module utilizes the Unified Remote remote control protocol to type out and deploy a payload. The remote control protocol can be configured to have no passwords, a group password, or individual user accounts. If the web page is accessible, the access control is set to no password for exploitation, then reverted. If the web page is not accessible, exploitation will be tried blindly. This module has been successfully tested against version 3.11.0.2483 (50) on Windows 10.

tags | exploit, remote, web, protocol
systems | windows
advisories | CVE-2022-3229
SHA-256 | 6c2eb4ad5b1e41ad931f1a7eef24882ce7a6fe92ea15f97c143643b989a7e758
WiFi Mouse 1.7.8.5 Remote Code Execution
Posted Feb 28, 2021
Authored by H4rk3nz0

WiFi Mouse version 1.7.8.5 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | 26ee57ad5e56c99a3851bf80a6fd10ad140b41167cd0ad64f51f6c14aa755468
ASUS Remote Link 1.1.2.13 Remote Code Execution
Posted Feb 25, 2021
Authored by H4rk3nz0

ASUS Remote Link version 1.1.2.13 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | 1a5ce5f0862db47d2e5496fc7bc55a8224b182341334fc196f04fe6b19a14c3b
Unified Remote 3.9.0.2463 Remote Code Execution
Posted Feb 24, 2021
Authored by H4rk3nz0

Unified Remote version 3.9.0.2463 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | 2b714b85c0360e22383d0e56c3e1e4fde06958f9dd60742fccaabf4d718bee20
WordPress Simple File List 5.4 Shell Upload
Posted Nov 2, 2020
Authored by H4rk3nz0

WordPress Simple File List plugin version 5.4 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | b6d82218d0df472d65a5d494c1d69fb41b45f32557c4cc264981441b60469b07
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close