exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 191 RSS Feed

Files

Axis Cameras Authorization Bypass / Unrestricted Access / Command Injection
Posted Jul 2, 2018
Authored by Or Peles | Site blog.vdoo.com

Axis Cameras suffer from authorization bypass, unrestricted dbus access, command injection, denial of service, and information disclosure vulnerabilities.

tags | exploit, denial of service, vulnerability, info disclosure
advisories | CVE-2018-10658, CVE-2018-10659, CVE-2018-10660, CVE-2018-10661, CVE-2018-10662, CVE-2018-10663, CVE-2018-10664
SHA-256 | 5e9747cd700a38abddaca3fd3d40d3df83bf20b08c4efc814e47b25f3307c9bf
Packet Storm New Exploits For July, 2016
Posted Aug 2, 2016
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 189 exploits added to Packet Storm in July, 2016.

tags | exploit
SHA-256 | e13a439ebcbdc61a9426b21acafbdd760dda29f7fe1a26252403bdeab0c53605
CHERRY B.UNLIMITED AES JD-0400EU-2/01 Crypto Issues / Replay Attacks
Posted Jul 30, 2016
Authored by Matthias Deeg, Gerhard Klostermeier | Site syss.de

CHERRY B.UNLIMITED AES version JD-0400EU-2/01 suffers from cryptographic issues and replay attack vulnerabilities.

tags | exploit, vulnerability
SHA-256 | 3737c6b837cb5779da05eb65eeceaa868fb36d30c20fac2a630e28c5168f4313
WebKit TypedArray.copyWithin Memory Corruption
Posted Jul 29, 2016
Authored by Google Security Research, natashenka

WebKit suffers from a memory corruption vulnerability in TypedArray.copyWithin.

tags | exploit
SHA-256 | a1a879392edefe9000a32a0b132faa9914f660c3f5583d951b4ba36dc59d1a5b
Fotoware Fotoweb 8.0 Cross Site Scripting
Posted Jul 29, 2016
Authored by Miguel A. Hernandez

Fotoware Fotoweb version 8.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 717d348863562a3aa670199e488c82077b04fa3638d2791f2a6ab5651d0df5fc
WebKit TypedArray.fill Memory Corruption
Posted Jul 29, 2016
Authored by Google Security Research, natashenka

WebKit suffers from a memory corruption vulnerability in TypedArray.fill.

tags | exploit
SHA-256 | dd867b4d358aaa6e14a0d03112c063c2e4ef03e466614c2eb27dcbda6488c1ef
Perixx Computer PERIDUO-710W Insufficient Protections
Posted Jul 29, 2016
Authored by Matthias Deeg, Gerhard Klostermeier | Site syss.de

Perixx Computer PERIDUO-710W suffers from insufficient protection of code (firmware) and data (cryptographic key).

tags | exploit
SHA-256 | 38f937f8061cad43b21e684ff35b905293604b2bc0497e65235d623d04f62a1c
Logitech K520 Crypto Issues / Replay Attacks
Posted Jul 29, 2016
Authored by Matthias Deeg, Gerhard Klostermeier | Site syss.de

Logitech K520 keyboards suffer form cryptographic issues and insufficient protection against replay attacks.

tags | exploit
SHA-256 | 02220b6a6fed68dae857d702f9529ab8a00d04c1577c2ca7f2ea7e090a2225d2
Vicon Network Camera Authentication Bypass
Posted Jul 29, 2016
Authored by Reginald Dodd

Vicon Network Cameras suffer from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | fc41aa317247b90493da204941efdd185920d76d224fc4726d74f91720157513
Barracuda Web Application Firewall 8.0.1.008 Post Auth Root
Posted Jul 29, 2016
Authored by Russell Sanford | Site metasploit.com

This Metasploit module exploits a remote command execution vulnerability in the Barracuda Web Application Firewall firmware versions 8.0.1.008 (2016-03-22) and below by exploiting a vulnerability in the web administration interface. By sending a specially crafted request it's possible to inject system commands while escalating to root do to relaxed sudo configuration on the local machine.

tags | exploit, remote, web, local, root
SHA-256 | e629172103ae4ff6e305d3b64279d72809b63af1ee85c6af41c91df3db7d9d96
CHERRY B.UNLIMITED AES JD-0400EU-2/01 Insufficient Protections
Posted Jul 29, 2016
Authored by Matthias Deeg, Gerhard Klostermeier | Site syss.de

CHERRY B.UNLIMITED AES version JD-0400EU-2/01 suffers from insufficient protection of code (firmware) and data (cryptographic key).

tags | exploit
SHA-256 | f1ff00bde501a530edae9d601cb3986ee2e1274ad3e4408f7af68bf525e7d5f6
ZMS CMS 3.2 Cross Site Scripting
Posted Jul 29, 2016
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

ZMS CMS version 3.2 suffers from multiple client-side cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | d1689365750d4ba1f5228287f04268ec54eb4b81703581f9546445b0ab459a52
Barracuda Web App Firewall/Load Balancer Post Auth Remote Root Exploit (3)
Posted Jul 28, 2016
Authored by Russell Sanford | Site metasploit.com

This Metasploit module exploits a remote command execution vulnerability in the Barracuda Web App Firewall Firmware Version <= 8.0.1.008 and Load Balancer Firmware <= v5.4.0.004 by exploiting a vulnerability in the web administration interface. By sending a specially crafted request it's possible to inject system commands while escalating to root do to relaxed sudo configurations on the appliances.

tags | exploit, remote, web, root
SHA-256 | ada1acb74888da1ee068093d1bfd8b3f3fa7cbe886c53bffebec80de7451a35e
WordPress Ultimate Product Catalog 3.9.8 SQL Injection
Posted Jul 28, 2016
Authored by Joaquin Ramirez Martinez

WordPress Ultimate Product Catalog plugin versions 3.9.8 and below suffer from a remote unauthenticated blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 5bacab668e9242da4ccd6ac7578697bc74b3ca2afbaf088e2ffe1dba9f652000
Linux ARM/ARM64 perf_event_open() Arbitrary Memory Read
Posted Jul 28, 2016
Authored by Jann Horn, Google Security Research

Linux ARM/ARM64 architectures suffer from an arbitrary memory read vulnerability in perf_event_open().

tags | exploit, arbitrary
systems | linux
SHA-256 | d93d6ea3ad561c8f7d1736c08ffd738028f0f1563210cd2723d3dd9167a9b0bc
Exponent CMS 2.3.9 XSS / User Injection
Posted Jul 28, 2016
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Exponent CMS version 2.3.9 suffers from a cross site scripting vulnerability that allows for user account addition.

tags | exploit, xss
SHA-256 | 423cf5f16e0bc3e2b68f98c0ffbfb9ff0056a53477952e4c8a5336cbd334fcf1
Zortam Media Studio 20.60 Buffer Overflow
Posted Jul 28, 2016
Authored by Vulnerability Laboratory, ZwX | Site vulnerability-lab.com

Zortam Media Studio version 20.60 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 60f4ac036146a9137d475523420c506dc7dcbe9ef06f4a36f384d1f5d5bb0db1
Saveya Script Insertion
Posted Jul 28, 2016
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Saveya suffers from a malicious script insertion vulnerability.

tags | exploit
SHA-256 | 5551173a26e0ebd8d02b44aefec2da15f69c5fefb72772e0228d85ebfaa58bcc
Zoll Checklist 1.2.2 Script Insertion
Posted Jul 28, 2016
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Zoll Checklist version 1.2.2 suffers from a malicious script insertion vulnerability.

tags | exploit
SHA-256 | eded9a2d4136f497a7b8aa4fc8fae14d8f6c7b0c761dd5482b1e3db648ac5264
AppArmor aa_fs_seq_hash_show Reference Count Leak
Posted Jul 28, 2016
Authored by Google Security Research, Mark Brand

AppArmor has a reference count leak in aa_fs_seq_hash_show that can be used to overflow the reference counter and trigger a kernel use-after-free.

tags | exploit, overflow, kernel
SHA-256 | aeb4adc2c9454e00e280467d5afe605088bc235c957b16c9ba2883396aeb3993
AXIS Authenticated Remote Command Execution
Posted Jul 28, 2016
Authored by OrwellLabs | Site orwelllabs.com

Multiple products from AXIS suffer from a remote command execution vulnerability.

tags | exploit, remote
advisories | CVE-2015-8257
SHA-256 | 5d3626abb1ca74ae36c7f97673ca1ac0fa4274ea3398a978924fd38256827c7b
LastPass 4.1.20a Communication Design Flaw
Posted Jul 28, 2016
Authored by Tavis Ormandy, Google Security Research

LastPass version 4.1.20a on Windows suffers from some issues where the add-on works by injecting elements and event handlers into the page. The attached proof of concept will delete a given file.

tags | exploit, proof of concept
systems | windows
SHA-256 | 251e29ebd27cfc49ad197f0294b26341778ad40b289cfd17cf8122679ada2ce7
Centreon Web Interface 2.5.3 Command Execution
Posted Jul 27, 2016
Authored by h00die, Nicolas Chatelain | Site metasploit.com

Centreon Web Interface versions 2.5.3 and below utilize an ECHO for logging SQL errors. This functionality can be abused for arbitrary code execution, and can be triggered via the login screen prior to authentication.

tags | exploit, web, arbitrary, code execution
SHA-256 | 5c09582d8455d486f9a8b546afc64ba7e1c0033c02c90405893cf9e6a8d35f16
Iris ID IrisAccess iCAM4000/iCAM7000 Hardcoded Creds / Remote Access
Posted Jul 27, 2016
Authored by LiquidWorm | Site zeroscience.mk

The Iris ID IrisAccess iCAM4000/7000 series suffer from a use of hard-coded credentials. When visiting the device interface with a browser on port 80, the application loads an applet JAR file 'ICAMClient.jar' into user's browser which serves additional admin features. In the JAR file there is an account 'rou' with password 'iris4000' that has read and limited write privileges on the affected node. An attacker can access the device using these credentials starting a simple telnet session on port 23 gaining access to sensitive information and/or FTP access on port 21 (with EVERYTHING allowed) and uploading malicious content.

tags | exploit
SHA-256 | ad28f751582d4594cec5c55c01bdc1eaae1d58398e82fe87383a507eb30e69ae
Iris ID IrisAccess ICU 7000-2 Remote Root Command Execution
Posted Jul 27, 2016
Authored by LiquidWorm | Site zeroscience.mk

The Iris ID IrisAccess ICU 7000-2 device suffers from an unauthenticated remote command execution vulnerability. The vulnerability exist due to several POST parameters in the '/html/SetSmarcardSettings.php' script not being sanitized when using the exec() PHP function while updating the Smart Card Settings on the affected device. Calling the '$CommandForExe' variable which is set to call the '/cgi-bin/setsmartcard' CGI binary with the affected parameters as arguments allows the attacker to execute arbitrary system commands as the root user and bypass the biometric access control in place.

tags | exploit, remote, arbitrary, cgi, root, php
SHA-256 | 9ac64b5f4368e8e636317ddaac6a7d12f9f73b9c06e7360a07239e379b4f1e3d
Page 1 of 8
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close