exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 162 RSS Feed

Files

Twitget 3.3.1 Cross Site Request Forgery / Cross Site Scripting
Posted Apr 11, 2014
Authored by Tom Adams

Twitget version 3.3.1 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
advisories | CVE-2014-2559
SHA-256 | 266b8fb377793b085d1c5af6d02746d14f19958217853a10c4f6eee53b74a035
Comtrend CT 5361T Password Disclosure
Posted Apr 11, 2014
Authored by TUNISIAN CYBER

Comtrend CT 5361T suffers from a password disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | c3beb0a9debd4f539927231b553437a370d4c2a79b7130c247a0f5193a78bcb0
D-Link DAP 1150 Cross Site Request Forgery / Cross Site Scripting
Posted Apr 11, 2014
Authored by MustLive

D-Link DAP 1150 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 4df31b39cf88630f9e6a0e14c8f3506537065b37bfa5724c7cedfd18d99cbd4f
Apple Mac OS X Lion Kernel xnu Privilege Escalation
Posted Apr 11, 2014
Authored by Kenzley Alphonse

Apple Mac OS X Lion kernel xnu versions 1699.32.7 except 1699.24.8 NFS mount privilege escalation exploit. This exploit leverage a stack overflow vulnerability to escalate privileges. The vulnerable function nfs_convert_old_nfs_args does not verify the size of a user-provided argument before copying it to the stack. As a result by passing a large size, a local user can overwrite the stack with arbitrary content.

tags | exploit, overflow, arbitrary, kernel, local
systems | apple, osx
SHA-256 | 8e779edf9df04a55e329faff795fd22465cd1d2fb570d611ba39e3d3871a8731
iVault Private P&V 1.1 Directory Traversal
Posted Apr 10, 2014
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

iVault Private P&V version 1.1 for iOS suffers from a directory traversal vulnerability.

tags | exploit
systems | apple, ios
SHA-256 | 8475893b7d785b8003e63e90143355211736835b580d0d5262083f82440f2a15
AppFish Offline Coder 2.2 Persistent Script Insertion
Posted Apr 10, 2014
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

AppFish Offline Coder version 2.2 for iOS suffers from a persistent script insertion vulnerability.

tags | exploit
systems | apple, ios
SHA-256 | 2c1882b76fa726a744b7d1acaaefdc3d30d552e0f9c68a7c31b67f419b719f30
BlueMe Bluetooth 5.0 Code Execution
Posted Apr 10, 2014
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

BlueMe Bluetooth version 5.0 for iOS suffers from a code execution vulnerability.

tags | exploit, code execution
systems | apple, ios
SHA-256 | 37d626f0020b96718d8daa286f2bae2c4ef35dbcc55bc04a265984572ffcd37a
Sendy 1.1.9.1 SQL Injection
Posted Apr 10, 2014
Authored by necro369

Sendy version 1.1.9.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 5c4b65786f4fb604aa4f00e42148db5fe0e0eb20240a98bab3e4f6d30e44c8be
CMS United Cross Site Scripting
Posted Apr 10, 2014
Authored by Renzi

CMS United suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | c2a2ddf01cac17429386e56f8a4e8aa5d000c4d608d1954ca2ca1629f76bfaa7
CMS eaZy SQL Injection
Posted Apr 10, 2014
Authored by Renzi

CMS eaZy suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | ae9c4b7f5c9fc1ad7a554a04ae7ceb2dcd688127fcff9dd2f4ec6515e639fa76
Bleed Out Heartbleed Command Line Tool 1.0.0.10
Posted Apr 10, 2014
Authored by John Leitch

Bleed Out is a command line tool written in C# for targeting instances of OpenSSL made vulnerable by the prolific "Heartbleed" bug. The tool aggressively exploits the OpenSSL vulnerability, dumping both ASCII and binary data to files. It also checks the uniqueness of each chunk before persisting it, to ensure that duplicate chunks are not saved.

Changes: Fixed exploitability test. Fixed argument validation. Fixed port exhaustion issue. Misc fixes. Minor CLI tweaks. Improved string searching. Added args for configuring retry. Changed target framework to .NET 4 for XP compatibility.
tags | exploit
advisories | CVE-2014-0160
SHA-256 | 8ac230f3902a7f35b6b76d9ad09ffa77ce032177754a06743c1ffa83672c1fcf
OpenSSL Heartbeat (Heartbleed) Information Leak
Posted Apr 10, 2014
Authored by Neel Mehta, juan vazquez, Christian Mehlmauer, wvu, Jared Stafford, Matti, Riku, Antti, FiloSottile | Site metasploit.com

This Metasploit module implements the OpenSSL Heartbleed attack. The problem exists in the handling of heartbeat requests, where a fake length can be used to leak memory data in the response. Services that support STARTTLS may also be vulnerable.

tags | exploit
advisories | CVE-2014-0160
SHA-256 | 81d080e43dc83f3e3ee46722a1679f1f403475e40beef0b849082092202ffa5c
WebLife CMS SQL Injection
Posted Apr 10, 2014
Authored by Renzi

WebLife CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 709bb5589b06fbb5733cc7479901b4ccf2e8568e0dc997680e6c166fa88f7bee
Bleed Out Heartbleed Command Line Tool 1.0.0.0
Posted Apr 10, 2014
Authored by John Leitch

Bleed Out is a command line tool written in C# for targeting instances of OpenSSL made vulnerable by the prolific "Heartbleed" bug. The tool aggressively exploits the OpenSSL vulnerability, dumping both ASCII and binary data to files. It also checks the uniqueness of each chunk before persisting it, to ensure that duplicate chunks are not saved.

tags | exploit
advisories | CVE-2014-0160
SHA-256 | 0154e0117391da9f265ff0a83bcd76a93f62d16f309e587ba789d69c8bbd8009
Sophos Web Protection Appliance Command Execution
Posted Apr 9, 2014
Authored by Brandon Perry | Site metasploit.com

This Metasploit module takes advantage of two vulnerabilities in order to gain remote code execution as root as an otherwise non-privileged authorized user. By taking advantage of a mass assignment vulnerability that allows an unprivileged authenticated user to change the administrator's password hash, the module updates the password to login as the admin to reach the second vulnerability. No server-side sanitization is done on values passed when configuring a static network interface. This allows an administrator user to run arbitrary commands in the context of the web application, which is root when configuring the network interface. This Metasploit module will inadvertently delete any other users that may have been present as a side effect of changing the admin's password.

tags | exploit, remote, web, arbitrary, root, vulnerability, code execution
SHA-256 | dec69c75e7fc0e768a05e89693c7430eec2119658aa589cd230964ae4332340f
XCloner Standalone 3.5 Cross Site Request Forgery
Posted Apr 9, 2014
Authored by High-Tech Bridge SA | Site htbridge.com

XCloner Standalone version 3.5 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2014-2579
SHA-256 | 7cff0b0c5062289d1c5503f87678d7e6b556fb49bac270e87ee36c051e96f8a0
Heartbleed TLS/DTLS Information Leak
Posted Apr 9, 2014
Authored by prdelka

This exploit uses OpenSSL to create an encrypted connection and trigger the heartbleed leak. The leaked information is returned encrypted and is then decrypted, decompressed and wrote to a file to annoy IDS/forensics. The exploit can set the heatbeart payload length arbitrarily or use two preset values for 0x00 and MAX length. The vulnerability occurs due to bounds checking not being performed on a heap value which is user supplied and returned to the user as part of DTLS/TLS heartbeat SSL extension. All versions of OpenSSL 1.0.1 to 1.0.1f are known affected. You must run this against a target which is linked to a vulnerable OpenSSL library using DTLS/TLS.

Changes: Multiple bug fixes have been added since the first release. Please ensure you have the latest copy.
tags | exploit
advisories | CVE-2014-0160
SHA-256 | 68bcedd2a727967e92d3a342ff6f366dc236929be5c2a5f69dba9ed2c35f299a
Orbit Open Ad Server 1.1.0 SQL Injection
Posted Apr 9, 2014
Authored by High-Tech Bridge SA | Site htbridge.com

Orbit Open Ad Server version 1.1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2014-2540
SHA-256 | 14a316274072f518559f502c18206d4ed660b33f9595c21dbee1144b878ea2ed
TLS Heartbeat Proof Of Concept
Posted Apr 9, 2014
Authored by Jared Stafford, Csaba Fitzl

OpenSSL TLS Heartbeat extension memory disclosure proof of concept. Expansion of the original exploit from Jared Stafford - this one supports multiple SSL/TLS versions.

tags | exploit, proof of concept
advisories | CVE-2014-0160
SHA-256 | eacf96cd5f65b639ffd1574293f581a43f690b7ab4f4237f23f7ea69179e7347
Trixbox 2.8.0.4 Cross Site Scripting
Posted Apr 9, 2014
Authored by W1ckerMan

Trixbox version 2.8.0.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | ac5debdefb1713dc35b3a6547af2cb9057024a951ff7e65c23b7c5901c7dc96f
Sagem Fast 3304-V2 Authentication Bypass
Posted Apr 9, 2014
Authored by Yassin Aboukir

Sagem Fast is an ADSL Router using a web management interface in order to change configuration settings. The router is vulnerable to an authentication bypass bug which allows unprivileged users to modify the preconfigured root password then log in with administrator permissions.

tags | exploit, web, root, bypass
SHA-256 | 22949d840ab867cf6603792f10c2fe512c4dd7337b959b8e1cc56ae6e862bc96
QuickCms 5.4 Cross Site Request Forgery / Cross Site Scripting
Posted Apr 9, 2014
Authored by shpendk

QuickCms version 5.4 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 77eab728345f155d905fd86af5dad89e8d24897cf985afdf2915d8fa61b866c9
csUpload Authentication Bypass
Posted Apr 9, 2014
Authored by Satanic2000

csUpload from cgiscript.net suffers from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | 735e30938f02765f8496c0e66fc35e514faf5d375041331fcaf86ea5113eb8c6
MS14-017 Microsoft Word RTF Object Confusion
Posted Apr 9, 2014
Authored by Haifei Li, Spencer McIntyre | Site metasploit.com

This Metasploit module creates a malicious RTF file that when opened in vulnerable versions of Microsoft Word will lead to code execution. The flaw exists in how a listoverridecount field can be modified to treat one structure as another. This bug was originally seen being exploited in the wild starting in April 2014. This Metasploit module was created by reversing a public malware sample.

tags | exploit, code execution
advisories | CVE-2014-1761
SHA-256 | dc312c58b345cdc30586c860d412b91fcac1d29d8b039194c3e389f62ccf5683
Heartbleed User Session Extraction
Posted Apr 9, 2014
Authored by Michael Davis, Jared Stafford

This python script is a modification of the heartbleed proof of concept exploit that looks for cookies, specifically user sessions.

tags | exploit, proof of concept, python
advisories | CVE-2014-0160
SHA-256 | 6be146c172695396122c8d40d4638e904f2ee1a827bd6f5062014ed22f051f9f
Page 5 of 7
Back34567Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close