what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 191 RSS Feed

Files

Windows Kernel UserCommitDesktopMemory Use-After-Free
Posted Sep 22, 2015
Authored by Nils, Google Security Research

The Microsoft Windows kernel suffers from a use-after-free vulnerability in UserCommitDesktopMemory.

tags | exploit, kernel
systems | linux, windows
advisories | CVE-2015-2365
SHA-256 | d1d309acfcd994767d657a143b1e405662a938b4370d0d8c5a73308836125489
Shadow Infosystem Arbitrary File Download
Posted Sep 22, 2015
Authored by Cloner-47

downloadcode.php from Shadow Infosystem suffers from an arbitrary file download vulnerability.

tags | exploit, arbitrary, php, info disclosure
SHA-256 | b3864dd1aa64620ab5f39a5ee1e756dd75eb81aa18ae0b6acd9703a1adf347dc
OS X Regex Engine Bad Alloca
Posted Sep 22, 2015
Authored by Google Security Research, Ian Beer

The OS X regex engine (TRE) uses the alloca function in a few places, sometimes where an attacker can partially control the size.

tags | exploit
systems | linux, apple, osx
advisories | CVE-2015-3797
SHA-256 | 4892e0cd6b0f4549272861144a2d62b719c14ab2eeb90564785bc88c25656d6e
Jasig CAS 4.0.1 Cross Site Scripting
Posted Sep 21, 2015
Authored by Antoni Klajn

Jasig CAS server version 4.0.1 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 928b84011dff3144a37d1cfdc7d395749395fab098e6d06d7a344dcc23637bb0
SAP Netweaver XML External Entity Injection
Posted Sep 21, 2015
Authored by Lukasz Miedzinski

SAP Netweaver versions prior to 7.01 suffer from an XXE injection vulnerability.

tags | exploit, xxe
advisories | CVE-2015-7241
SHA-256 | 987e7fdca3ec106a0a0d7d54210c112384477f102eb17692cff33e9a889a6a56
ADH-Web IP Camera Access Bypass
Posted Sep 21, 2015
Authored by OrwellLabs

ADH-Web IP Cameras suffer from improper access restrictions and various other vulnerabilities.

tags | exploit, web, vulnerability, bypass
SHA-256 | f27d5f8c91ba3407b2bb5fd671d93c6be791bedca6d727599be3ad493389bd28
IntelBras WRN 340 Unauthenticated Remote DNS Changer
Posted Sep 21, 2015
Authored by Gabriel P. Lipski

IntelBras WRN 340 (ADSL modem router) remote unauthenticated DNS changing exploit.

tags | exploit, remote
SHA-256 | 17dc64fef14b3ce589e6d84108278318da8bf27f17e2823a9ea2fc50d8fc4ab6
Total Commander 8.52 Buffer Overflow (Windows 10)
Posted Sep 20, 2015
Authored by VIKRAMADITYA

Total Commander version 8.52 buffer overflow exploit designed to be used on Windows 10.

tags | exploit, overflow
systems | windows
SHA-256 | bebe7348068124a14b4b81b6f9aa876de76053f9d8430e4750db22b4277059e7
Total Commander 8.52 Buffer Overflow
Posted Sep 20, 2015
Authored by VIKRAMADITYA

Total Commander version 8.52 buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 971321e53a7c338abcf6b4b4b5b0aa00d56ecd7e6f7b514c243f3b8e020a8694
Thomson CableHome Gateway DWG849 Information Disclosure
Posted Sep 20, 2015
Authored by Matt Dunlap

Thomson CableHome Gateway DWG849 suffers from an information disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | d61c502c86dfc89c223647a763226ce1024442050ddd4fff9c2f9745e6eeff50
Konica Minolta FTP Utility 1.00 Post Auth CWD Command SEH Overflow
Posted Sep 19, 2015
Authored by Shankar Damodaran | Site metasploit.com

This Metasploit module exploits an SEH overflow in Konica Minolta FTP Server 1.00. Konica Minolta FTP fails to check input size when parsing 'CWD' commands, which leads to an SEH overflow. Konica FTP allows anonymous access by default; valid credentials are typically unnecessary to exploit this vulnerability.

tags | exploit, overflow
SHA-256 | 9b4e188dfd973cb391489182e25092159a1a540a9de8fa14b7fbb50169dd49ff
VBox Satellite Express Arbitrary Write Privilege Escalation
Posted Sep 19, 2015
Authored by Matthew Bergin

A vulnerability within the ndvbs module allows an attacker to inject memory they control into an arbitrary location they define. This vulnerability can be used to overwrite function pointers in HalDispatchTable resulting in an elevation of privilege. suffers from code execution, and local file inclusion vulnerabilities.

tags | exploit, arbitrary, local, vulnerability, code execution, file inclusion
advisories | CVE-2015-6923
SHA-256 | f56522b7ad8171646ac1c3eea8d0052f0c4e3db5b5c86c6dd3e9b9fae91e3b70
WordPress Vertical Image Slider 1.0 CSRF / XSS
Posted Sep 19, 2015
Authored by Ehsan Hosseini

WordPress Vertical Image Slider plugin version 1.0 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 63f064a0c336409406e1795abef613e59a229b155d2c3f25704ac46915950f95
Windows Task Scheduler DeleteExpiredTaskAfter File Deletion Privilege Escalation
Posted Sep 18, 2015
Authored by Google Security Research, forshaw

The Task Scheduler can be made to delete a task after it's trigger has expired. No check is made to ensure the task file is not a junction which allows arbitrary files to be deleted by the system user leading to EoP.

tags | exploit, arbitrary
systems | linux
advisories | CVE-2015-2525
SHA-256 | c30785bf661d0d66daa78abe61a94c360587d6e66ae875cfc5a81dc4ec54b02e
Windows NtUserGetClipboardAccessToken Token Leak Redux
Posted Sep 18, 2015
Authored by Google Security Research, forshaw

The NtUserGetClipboardAccessToken win32k system call exposes the access token of the last user to lower-privileged users. It can also be used to open an anonymous impersonation thread token which normally OpenThreadToken shouldn't be able to do. This is a bypass of the fix for CVE-2015-0078.

tags | exploit
systems | linux
advisories | CVE-2015-2527
SHA-256 | 9bcf7274e363f1dc579d9ed68048a01019d56cc2f841f1a4a04c182389196296
Microsoft Office 2007 OGL.dll ValidateBitmapInfo Bounds Check Failure
Posted Sep 18, 2015
Authored by Google Security Research, scvitti

A bounds check crash was observed in Microsoft Office 2007 Excel with Microsoft Office File Validation Add-In disabled and Application Verifier enabled for testing and reproduction. This bug did not reproduce in Office 2010 or 2013.

tags | exploit
systems | linux
advisories | CVE-2015-2510
SHA-256 | 05a60e7019067851141f1787a5bbda75454773b40b9acf97e8b754f2fad758fd
Microsoft Office Excel 2007, 2010, 2013 Use-After-Free With BIFFRecord
Posted Sep 18, 2015
Authored by Google Security Research, scvitti

Microsoft Excel 2007 running on Windows 2003 suffers from a use-after-free vulnerability.

tags | exploit
systems | linux, windows
advisories | CVE-2015-2523
SHA-256 | 460bd27af88f7165a795d698b85d2e4cd8c83732200f70dc5c84e7b8e4818f79
Windows User Mode Font Driver Thread Permissions EoP
Posted Sep 18, 2015
Authored by Google Security Research, forshaw

The host process for the UMFD runs as a normal user but with a heavily restrictive process DACL. It's possible execute arbitrary code within the context of the process because it's possible to access the processes threads leading to local EoP.

tags | exploit, arbitrary, local
systems | linux
advisories | CVE-2015-2508
SHA-256 | f0ec77ee8811de8feb9edad30b69fae9734672773f9e5a37d08fdba2317cebd5
Microsoft Office 2007 BIFFRecord Length Use-After-Free
Posted Sep 18, 2015
Authored by Google Security Research, scvitti

A use-after-free crash was observed in Microsoft Office 2007 with Microsoft Office File Validation Add-In disabled and Application Verifier enabled for testing and reproduction. This bug did not reproduce in Office 2010 or 2013.

tags | exploit
systems | linux
advisories | CVE-2015-2520
SHA-256 | 3b2e620089c3777eb2d36942713f33cf68f9865e894dbaee83bdbdb3af57385c
Microsoft Office 2007 OLESSDirectyEntry.CreateTime Type Confusion
Posted Sep 18, 2015
Authored by Google Security Research, scvitti

A type confusion crash was observed in Microsoft Office 2007 with Microsoft Office File Validation Add-In disabled and Application Verifier enabled for testing and reproduction. This bug did not reproduce in Office 2010 or 2013.

tags | exploit
systems | linux
advisories | CVE-2015-2521
SHA-256 | 247823ed9395d266e8674965a149848a04a5b7380aa2bf3723839d71d6ca65a6
Farol SQL Injection
Posted Sep 18, 2015
Authored by Thierry Fernandes Faria

Farol suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2015-6962
SHA-256 | df6cc2ad04df2605a64ef148d68abc88d2f8585d578b3fc546581b6423ee7f3e
Windows CreateObjectTask TileUserBroker Privlege Escalation
Posted Sep 18, 2015
Authored by Google Security Research, forshaw

The Microsoft\Windows\Shell\CreateObjectTask initializes a shell32 based ICreateObject COM server as local system. This is marked as being accessible from a normal user account so once created we can attach to it. The server only has one method, CreateObject which checks the CLSID against a list of known safe classes before allowing it to be instantiated. One of these classes is allows a user to set their account picture for the logon screen.

tags | exploit, shell, local
systems | linux, windows
advisories | CVE-2015-2528
SHA-256 | 6a43091589e97afa78001dc6e8f0c4e88aed1de975f8578e7b0706c3c45901f3
Windows CreateObjectTask SettingsSyncDiagnostics Privilege Escalation
Posted Sep 18, 2015
Authored by Google Security Research, forshaw

The Microsoft\Windows\Shell\CreateObjectTask initializes a shell32 based ICreateObject COM server as local system. This is marked as being accessible from a normal user account so once created we can attach to it. The server only has one method, CreateObject which checks the CLSID against a list of known safe classes before allowing it to be instantiated. One of these classes is a diagnostic class for setting synchronization implemented in SettingSync.dll.

tags | exploit, shell, local
systems | linux, windows
advisories | CVE-2015-2524
SHA-256 | 6aef4dd16b7085d61fe94cd118f3ece652f9cd33df0722b63a4bf31f53557554
OS X IOKit Kernel Memory Corruption
Posted Sep 18, 2015
Authored by Google Security Research, Ian Beer

An OS X IOKit kernel memory corruption issue occurs due to a bad bzero in IOBluetoothDevice.

tags | exploit, kernel
systems | linux, apple, osx
advisories | CVE-2014-8836
SHA-256 | f3d2f3b8051f90b86f0cfd263f09f98a7e0e04c1e1fcff20c13e3ca8f318052c
iBooking CMS SQL Injection
Posted Sep 18, 2015
Authored by Cleiton Pinheiro

iBooking CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | f940a1514994a822f9b19f66067c704407e5484e1dded2db9cec7600be48e779
Page 4 of 8
Back23456Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close