exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 875 RSS Feed

Files from LiquidWorm

Real NameGjoko Krstic
Email addressprivate
First Active2007-07-26
Last Active2023-05-15
View User Profile
Screen SFT DAB 600/C Unauthenticated Information Disclosure
Posted May 15, 2023
Authored by LiquidWorm | Site zeroscience.mk

Screen SFT DAB 600/C is affected by an information disclosure vulnerability due to improper access control enforcement. An unauthenticated remote attacker can exploit this via a specially crafted request to gain access to sensitive information including usernames and source IP addresses.

tags | exploit, remote, info disclosure
SHA-256 | e3416b7b51b13c8a02e0377d294d6b4b558ba2a448f681c4ee83ec0d4a9214df
Screen SFT DAB 600/C Authentication Bypass / Reset Board Config
Posted May 15, 2023
Authored by LiquidWorm | Site zeroscience.mk

Screen SFT DAB 600/C suffers from a weak session management that can allow an attacker on the same network to bypass these controls by reusing the same IP address assigned to the victim user (NAT) and exploit crucial operations on the device itself. By abusing the IP address property that is binded to the Session ID, one needs to await for such an established session and issue unauthorized requests to the vulnerable API to manage and/or manipulate the affected transmitter.

tags | exploit
SHA-256 | 0775eb59979d4285d81f3e446995dfddd17a03e6b3fb4d0066b5e60a4d94b27a
Screen SFT DAB 600/C Authentication Bypass / Admin Password Change
Posted May 15, 2023
Authored by LiquidWorm | Site zeroscience.mk

Screen SFT DAB 600/C exploit that circumvents the control and requirement of the admin's old password and directly changes the password.

tags | exploit
SHA-256 | dfcbdbbd5c02702d5532b7a0e38376e5c9b13dc8b11dcbb24c7816464b0a1048
Screen SFT DAB 600/C Authentication Bypass / Erase Account
Posted May 15, 2023
Authored by LiquidWorm | Site zeroscience.mk

Screen SFT DAB 600/C suffers from a weak session management that can allow an attacker on the same network to bypass these controls by reusing the same IP address assigned to the victim user (NAT) and exploit crucial operations on the device itself. By abusing the IP address property that is binded to the Session ID, one needs to await for such an established session and issue unauthorized requests to the vulnerable API to manage and/or manipulate the affected transmitter.

tags | exploit
SHA-256 | e5293775a6d798d227c2626e73ff3e846471a825452ef4ce910c61e4724d48d2
Screen SFT DAB 600/C Authentication Bypass / Password Change
Posted May 15, 2023
Authored by LiquidWorm | Site zeroscience.mk

Screen SFT DAB 600/C suffers from a weak session management that can allow an attacker on the same network to bypass these controls by reusing the same IP address assigned to the victim user (NAT) and exploit crucial operations on the device itself. By abusing the IP address property that is binded to the Session ID, one needs to await for such an established session and issue unauthorized requests to the vulnerable API to manage and/or manipulate the affected transmitter.

tags | exploit
SHA-256 | 2848c1fbf6cfd49fdb794989936933fa8921c22fc36b62a88a8e30d1da63c3aa
Screen SFT DAB 600/C Authentication Bypass / Account Creation
Posted May 15, 2023
Authored by LiquidWorm | Site zeroscience.mk

Screen SFT DAB 600/C suffers from a weak session management that can allow an attacker on the same network to bypass these controls by reusing the same IP address assigned to the victim user (NAT) and exploit crucial operations on the device itself. By abusing the IP address property that is binded to the Session ID, one needs to await for such an established session and issue unauthorized requests to the vulnerable API to manage and/or manipulate the affected transmitter.

tags | exploit
SHA-256 | 1734aa4dedbdbfbce8e975323fff3ec40c7fd2ae37818906ff3811eabf272f54
Sielco PolyEco Digital FM Transmitter 2.0.6 Default Credentials
Posted Apr 12, 2023
Authored by LiquidWorm | Site zeroscience.mk

Sielco PolyEco Digital FM Transmitter version 2.0.6 uses a weak set of default administrative credentials that can be easily guessed in remote password attacks to gain full control of the system.

tags | exploit, remote
SHA-256 | 4b06b64589263878904bbae281d9bc23f194bb5f895a3a50d9058978920f6a0e
Sielco PolyEco Digital FM Transmitter 2.0.6 Cookie Brute Force
Posted Apr 12, 2023
Authored by LiquidWorm | Site zeroscience.mk

Sielco PolyEco Digital FM Transmitter version 2.0.6 suffers from a cookie brute forcing vulnerability that can allow for session hijacking.

tags | exploit
SHA-256 | 8f1daeafa0b883f3bc1384e9d0ca0360450ece2b79076365d95798b698667cd0
Sielco PolyEco Digital FM Transmitter 2.0.6 Authentication Bypass
Posted Apr 12, 2023
Authored by LiquidWorm | Site zeroscience.mk

Sielco PolyEco Digital FM Transmitter version 2.0.6 suffers from authentication bypass, account takeover / lockout, and privilege escalation vulnerabilities that can be triggered by directly calling the user object and modifying the password of the two constants user/role (user/admin). This can be exploited by an unauthenticated adversary by issuing a single POST request to the vulnerable endpoint and gain unauthorized access to the affected device with administrative privileges.

tags | exploit, vulnerability
SHA-256 | 1779dd48b3ba2fb604c2b3fe1410c7bc803e1f964aaa62ab3b478868956ced70
Sielco PolyEco Digital FM Transmitter 2.0.6 Information Disclosure
Posted Apr 12, 2023
Authored by LiquidWorm | Site zeroscience.mk

Sielco PolyEco Digital FM Transmitter version 2.0.6 suffers from an information disclosure vulnerability due to improper access control enforcement. An unauthenticated remote attacker can exploit this issue via a specially crafted request to gain access to sensitive information.

tags | exploit, remote, info disclosure
SHA-256 | 267418fd80ab371b230bbaa9fdec8767c24efde298174b16aca5925e335bcb57
Sielco PolyEco Digital FM Transmitter 2.0.6 POST Manipulation
Posted Apr 12, 2023
Authored by LiquidWorm | Site zeroscience.mk

Sielco PolyEco Digital FM Transmitter version 2.0.6 suffers from a radio data system POST manipulation vulnerability.

tags | exploit
SHA-256 | e4b2d7df23ae1d7324dc922c11ba13e061cf42b3b6e86c38b42666eb035ea0d7
Sielco PolyEco Digital FM Transmitter 2.0.6 Authorization Bypass
Posted Apr 12, 2023
Authored by LiquidWorm | Site zeroscience.mk

Sielco PolyEco Digital FM Transmitter version 2.0.6 suffers from an authorization bypass vulnerability.

tags | exploit, bypass
SHA-256 | 914581db2916f5747f0db33acd0f545ea153e562c456cbc46171baf8c4bada5d
Sielco PolyEco Digital FM Transmitter 2.0.6 Authentication Bypass
Posted Apr 12, 2023
Authored by LiquidWorm | Site zeroscience.mk

Sielco PolyEco Digital FM Transmitter version 2.0.6 suffers from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | 04fe7d8ff6572fa3612a369b0c0a33163c016a620b5ff6ab9e58d326db1f5cf8
Sielco Radio Link 2.06 Remote Privilege Escalation
Posted Apr 12, 2023
Authored by LiquidWorm | Site zeroscience.mk

Sielco Radio Link version 2.06 suffers from a remote privilege escalation vulnerability.

tags | exploit, remote
SHA-256 | 0c75a354919091616a5f5737e0902174ba1e520eeba17f8046eaaf7514082d82
Sielco Radio Link 2.06 Improper Access Control
Posted Apr 12, 2023
Authored by LiquidWorm | Site zeroscience.mk

Sielco Radio Link version 2.06 suffers from an improper access control vulnerability that allows for a lower privileged user to change the administrator's password.

tags | exploit
SHA-256 | f9373f954a93947453ded81dc6daa3fec0b14580a358bf7dd553b39b0a3ac6e3
Sielco Radio Link 2.06 Cross Site Request Forgery
Posted Apr 12, 2023
Authored by LiquidWorm | Site zeroscience.mk

Sielco Radio Link version 2.06 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | c17546acff364d10c1872ec359f38d4d53aa3ec8bfa731bb52efa125a19521ce
Sielco Radio Link 2.06 Cookie Brute Force
Posted Apr 12, 2023
Authored by LiquidWorm | Site zeroscience.mk

Sielco Radio Link version 2.06 suffers from a cookie brute forcing vulnerability that can allow for session hijacking.

tags | exploit
SHA-256 | b3c859a3990332816faa05fab3d576d807b312c06709f5259ba34906edcbc66e
Sielco Analog FM Transmitter 2.12 Remote Privilege Escalation
Posted Apr 12, 2023
Authored by LiquidWorm | Site zeroscience.mk

Sielco Analog FM Transmitter version 2.12 suffers from a remote privilege escalation vulnerability.

tags | exploit, remote
SHA-256 | f9e8dacd33d3784c7f722d94e8a2f150689a024754736b4c0454360058ce7c17
Sielco Analog FM Transmitter 2.12 Improper Access Control
Posted Apr 12, 2023
Authored by LiquidWorm | Site zeroscience.mk

Sielco Analog FM Transmitter version 2.12 suffers from an improper access control vulnerability that allows for a lower privileged user to change the administrator's password.

tags | exploit
SHA-256 | d26af0548c227a54b41c51e35c1c6513352b0b18304e8cf89730a7260c3ad51d
Sielco Analog FM Transmitter 2.12 Cross Site Request Forgery
Posted Apr 12, 2023
Authored by LiquidWorm | Site zeroscience.mk

Sielco Analog FM Transmitter version 2.12 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | c1c1c47865eb0e698992e725937498a55c55a78c7bf94b4e53ab2fcb7e6d18b5
Sielco Analog FM Transmitter 2.12 Cookie Brute Force
Posted Apr 12, 2023
Authored by LiquidWorm | Site zeroscience.mk

Sielco Analog FM Transmitter version 2.12 suffers from a cookie brute forcing vulnerability that can allow for session hijacking.

tags | exploit
SHA-256 | 96ea285153f1385d9929ef190734969d4bc702d1d9aa0eea1a04870c880ae84a
Google Chrome Browser 111.0.5563.64 AXPlatformNodeCocoa Denial Of Service
Posted Apr 12, 2023
Authored by LiquidWorm | Site zeroscience.mk

Google Chrome Browser version 111.0.5563.64 suffers from an AXPlatformNodeCocoa fatal out-of-memory denial of service vulnerability on macOS.

tags | exploit, denial of service
SHA-256 | 0f11dee0a3ee89decd4ede4b99ca33ca5b7ef40ffe08c8c8a668fe309ac5f950
Osprey Pump Controller 1.0.1 Unauthenticated Remote Code Execution
Posted Feb 28, 2023
Authored by LiquidWorm | Site zeroscience.mk

Osprey Pump Controller version 1.0.1 unauthenticated remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | e3aa8cf09a10153c22c1fea563f19e0486760740b752b12095b5ec99f655864f
Osprey Pump Controller 1.0.1 Cross Site Request Forgery
Posted Feb 28, 2023
Authored by LiquidWorm | Site zeroscience.mk

Osprey Pump Controller version 1.0.1 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 3ff94000035eb0e3d7750af6a36a24cd3f59ddd0bf32adc49eed8270dae8c139
Osprey Pump Controller 1.0.1 Authentication Bypass
Posted Feb 28, 2023
Authored by LiquidWorm | Site zeroscience.mk

Osprey Pump Controller version 1.0.1 allows an unauthenticated attacker to create an account and bypass authentication, thereby gaining unauthorized access to the system.

tags | exploit
SHA-256 | f96ac6802073d61b8a8224120fbbc475b78857a672615467fe07f5419f23785a
Page 1 of 35
Back12345Next

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    13 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    32 Files
  • 6
    Jun 6th
    39 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close