exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 186 RSS Feed

Files

WebGUI 7.10.29 Cross Site Scripting
Posted Jan 18, 2015
Authored by SECUPENT

WebGUI version 7.10.29 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 3d3e6b21fe45432b0e40db0c1889193862c287262d17d520f6fe75f10e008edc
File Pro Mini 5.2 Local File Inclusion / Command Injection
Posted Jan 16, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

File Pro Mini version 5.2 suffers from command injection and local file inclusion vulnerabilities.

tags | exploit, local, vulnerability, file inclusion
SHA-256 | 61cea2d0f359c24b386460b827adaf2a360bd5c83cb5f78946a2cc9790c4555a
VeryPhoto 3.0 Command Injection
Posted Jan 16, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

VeryPhoto version 3.0 suffers from a command injection vulnerability.

tags | exploit
SHA-256 | a176d6e3ecc622dc3aa6b5a3e580652f3cd38b8d3c1db5d1822ae3490e2b1984
Sim Editor 6.6 Buffer Overflow
Posted Jan 16, 2015
Authored by Osanda Malith

Sim Editor version 6.6 stack-based buffer overflow exploit.

tags | exploit, overflow
advisories | CVE-2015-1171
SHA-256 | 0f061824fc59baa0d38bfd9364ff194c26e0a2185d52c693740a5897afacaa48
Facebook Mobile Parameter Tampering Bypass
Posted Jan 16, 2015
Authored by Paulos Yibelo, Vulnerability Laboratory | Site vulnerability-lab.com

Facebook Mobile allowed for a name change prior to the 60 day limit.

tags | exploit
SHA-256 | e9022186bc9182406a9f7e6e9807d1d8c75ccb9ffbc563e752cb736aac563f8b
CatBot 0.4.2 SQL Injection
Posted Jan 16, 2015
Authored by Paulos Yibelo, Vulnerability Laboratory | Site vulnerability-lab.com

CatBot version 0.4.2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 8ca8d8041febb4bd7e87451a3b49b4a0db8053b94320613163e2349fd83ba080
Pandora FMS 5.1 SP1 Cross Site Scripting
Posted Jan 16, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Pandora FMS version 5.1 SP1 suffers from a persistent cross site scripting vulnerability in the SNMP editor.

tags | exploit, xss
SHA-256 | e6fd854ee49192290abf5846acc7a072a9debbbaa248635f0fc0042fbd716a1b
Microsoft Windows Impersonation Check Bypass
Posted Jan 16, 2015
Authored by Google Security Research

The function CryptProtectMemory allows an application to encrypt memory for one of three scenarios, process, logon session and computer. When using the logon session option (CRYPTPROTECTMEMORY_SAME_LOGON flag) the encryption key is generated based on the logon session identifier, this is for sharing memory between processes running within the same logon. As this might also be used for sending data from one process to another it supports extracting the logon session id from the impersonation token. The issue is the implementation in CNG.sys doesn't check the impersonation level of the token when capturing the logon session id (using SeQueryAuthenticationIdToken) so a normal user can impersonate at Identification level and decrypt or encrypt data for that logon session. This might be an issue if there's a service which is vulnerable to a named pipe planting attack or is storing encrypted data in a world readable shared memory section. This is the proof of concept code that demonstrates the issue. This affects Windows 7, 8.1 Update 32/64 bit.

tags | exploit, proof of concept
systems | windows
SHA-256 | 4209894f8317e6b800fd3d23f74c828d6c6e1b7528046ac121ee759f36fecc03
Alienvault OSSIM/USM 4.14.X Command Execution
Posted Jan 16, 2015
Authored by Peter Lapp

Alienvault OSSIM/USM versions 4.14.x and below suffer from a remote command execution vulnerability. Proof of concept included.

tags | exploit, remote, proof of concept
SHA-256 | a68baa3bbf3f63879d7b7f3eaa8c9b8bc017abc0c0112daba2b272eca6043950
GetGo Download Manager HTTP Response Buffer Overflow
Posted Jan 15, 2015
Authored by Julien Ahrens, Gabor Seljan | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow vulnerability in GetGo Download Manager version 4.9.0.1982 and earlier, caused by an overly long HTTP response header. By persuading the victim to download a file from a malicious server, a remote attacker could execute arbitrary code on the system or cause the application to crash. This Metasploit module has been tested successfully on Windows XP SP3.

tags | exploit, remote, web, overflow, arbitrary
systems | windows
advisories | CVE-2014-2206
SHA-256 | d221161463d2ce4c841da81d4b8047cf3a870adfd262c14d29a88c0aff92cacf
Microsoft Windows NtApphelpCacheControl Improper Authorization Check
Posted Jan 15, 2015
Authored by sinn3r, James Forshaw | Site metasploit.com

On Windows, the system call NtApphelpCacheControl (the code is actually in ahcache.sys) allows application compatibility data to be cached for quick reuse when new processes are created. A normal user can query the cache but cannot add new cached entries as the operation is restricted to administrators. This is checked in the function AhcVerifyAdminContext. This function has a vulnerability where it doesn't correctly check the impersonation token of the caller to determine if the user is an administrator. It reads the caller's impersonation token using PsReferenceImpersonationToken and then does a comparison between the user SID in the token to LocalSystem's SID. It doesn't check the impersonation level of the token so it's possible to get an identify token on your thread from a local system process and bypass this check. This Metasploit module currently only affects Windows 8 and Windows 8.1, and requires access to C:\Windows\System\ComputerDefaults.exe (although this can be improved).

tags | exploit, local
systems | windows
advisories | CVE-2015-0002
SHA-256 | 36677bd1211abded7668cec79a01236adc56ce9a61fd946306e8c8d33aefa513
WordPress Simple Security 1.1.5 Cross Site Scripting
Posted Jan 14, 2015
Authored by High-Tech Bridge SA | Site htbridge.com

WordPress Simple Security plugin version 1.1.5 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2014-9570
SHA-256 | 7903268191af99e0f4af1ae087e4cd87915db78de06194ae76e97b648cdc5af7
Microsoft MS14-080 Proof Of Concept
Posted Jan 14, 2015
Authored by Dieyu

Proof of concept code that demonstrates a bypass flaw in Microsoft's cross site scripting filter.

tags | exploit, xss, proof of concept
advisories | CVE-2014-6365
SHA-256 | 0875f3451496c71e7cae3de5807a25a36dee4a8152a23f8e1981178604c35d34
WiFi File Browser Pro 2.0.8 Code Execution
Posted Jan 14, 2015
Authored by Hadji Samir, Vulnerability Laboratory

WiFi File Browser Pro version 2.0.8 suffers from a code execution vulnerability.

tags | exploit, code execution
SHA-256 | 3a17fedccf065dba2df2c8cc06ab986128e6739ee172a59e2c48817e94704d18
Sierra Wireless AirCard 760S/762S/763S Mobile Hotspot CRLF Injection
Posted Jan 14, 2015
Authored by Luke Walker

Sierra Wireless produces a mobile wi-fi hotspot device that is popular amongst telecommunication companies for re-branding to suit local markets. The AirCard 760S/762S/763S Web-based Administrative Console suffers from a HTTP header injection that allows an attacker to inject a file into the HTTP response from the device.

tags | exploit, web, local, file inclusion
SHA-256 | ded2a0627c3a429a64de38ac35a2932ed3eba1561ee7e5b46f1a77886f913fdd
TechSmith Camtasia 7 / 8 Cross Site Scripting
Posted Jan 14, 2015
Authored by Soroush Dalili

TechSmith Camtasia versions 7 and 8 suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 0da3668d93c5d907fcfe6b8abc0ab9b5251abb5997b3d5d0d8042ce947378c29
Foxit MobilePDF 4.4.0 Local File Inclusion / Arbitrary File Upload
Posted Jan 14, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Foxit MobilePDF version 4.4.0 suffers from arbitrary file upload and local file inclusion vulnerabilities.

tags | exploit, arbitrary, local, vulnerability, file inclusion, file upload
SHA-256 | 5f85f991b9a8dad94c8ffd8d5807d15fd8470726411c60a63efafc1858cefbce
Blitz CMS SQL Injection
Posted Jan 14, 2015
Authored by P0!s0nC0d3, Vulnerability Laboratory | Site vulnerability-lab.com

Blitz CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c66ceb6f433e98cdcfb6154dfe4e13c116eb212f54de99cc44c88cbcb6870da4
Sitefinity Enterprise 7.2.53 Script Insertion
Posted Jan 14, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Sitefinity Enterprise version 7.2.53 suffers from a persistent script insertion vulnerability.

tags | exploit
SHA-256 | bc702250ffdaf36a6363da46fb048aa11ee62eed45197602c51eac283f6341bb
Ansible Tower 2.0.2 XSS / Privilege Escalation / Authentication Missing
Posted Jan 14, 2015
Authored by Manuel Hofer | Site sec-consult.com

Ansible Tower versions 2.0.2 and below suffer from cross site scripting, privilege escalation, and missing vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 6e3115b310156299b33941a1b818a51f6f4f245f77904472bfc207672fab5870
Congstar Internet-Manager SEH Buffer Overflow
Posted Jan 14, 2015
Authored by metacom

Congstar Prepaid Internet-Stick suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | b161408db9940a56935ea3d2849edc91522ac265879fb0edcd77fc15f1807ba5
T-Mobile Internet Manager SEH Buffer Overflow
Posted Jan 14, 2015
Authored by metacom

T-Mobile Internet Manager web'n'walk Stick Fusion version 8.01.2015 suffers from a buffer overflow vulnerability.

tags | exploit, web, overflow
SHA-256 | 6c14082d057cbbddf70192794e7aed3390eae31cd95dbd6f2dabe41eb835f51d
CMS b2evolution 5.2.0 Cross Site Scripting
Posted Jan 14, 2015
Authored by Steffen Roesemann

CMS b2evolution version 5.2.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 4b95a602e4064b14c1925613d95f0cd6ab4878e0ce547bf1e2ca309b92c192e4
OS X 10.10 Bluetooth TransferACLPacketToHW Crash Proof Of Concept
Posted Jan 14, 2015
Authored by Roberto Paleari, Aristide Fattori

OS X 10.10 Bluetooth TransferACLPacketToHW crash denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
systems | apple, osx
SHA-256 | 8c9dfd0cb0115429d6229b818d3e69f753cdd59dc26b6381a12ffcbf5264ccda
OS X 10.10 Bluetooth BluetoothHCIChangeLocalName Crash Proof Of Concept
Posted Jan 14, 2015
Authored by Roberto Paleari, Aristide Fattori

OS X 10.10 Bluetooth BluetoothHCIChangeLocalName crash denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
systems | apple, osx
SHA-256 | a50ca06a0203967966d658916c7f43401c0a173e68ebcbb744f3d6d302b27721
Page 5 of 8
Back34567Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close