exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 875 RSS Feed

Files from LiquidWorm

Real NameGjoko Krstic
Email addressprivate
First Active2007-07-26
Last Active2023-05-15
View User Profile
Verizon 4G LTE Network Extender 0.4.038.2131 Weak Credential Algorithm
Posted Apr 13, 2022
Authored by LiquidWorm | Site zeroscience.mk

Verizon's 4G LTE Network Extender is utilizing a weak default admin password generation algorithm. The password is generated using the last 4 values from device's MAC address which is disclosed on the main webUI login page to an unauthenticated attacker. The values are then concatenated with the string LTEFemto resulting in something like LTEFemtoD080 as the default Admin password. Versions GA4.38 through 0.4.038.2131 are affected.

tags | exploit
SHA-256 | 59ce4ad0a80db9115ae14b1ebb563c934a8d4e694bb93586a6f38b338e1ab98d
ICT Protege GX/WX 2.08 Client-Side SHA1 Password Hash Disclosure
Posted Mar 21, 2022
Authored by LiquidWorm | Site zeroscience.mk

ICT Protege GX/WX version 2.08 suffers from a client-side SHA1 password hash disclosure vulnerability.

tags | exploit
SHA-256 | f203bc1b35e3b9d44818d0680ff7a367ed1eac4fa488fe060a5c8a1fec93d479
ICT Protege GX/WX 2.08 Cross Site Scripting
Posted Mar 21, 2022
Authored by LiquidWorm | Site zeroscience.mk

ICT Protege GX/WX version 2.08 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 0761967ed7f26d12def00046c1c81a51292379f6aee38f2875fd95654cb59e1a
ICL ScadaFlex II SCADA Controllers SC-1/SC-2 1.03.07 Remote File Modification
Posted Feb 22, 2022
Authored by LiquidWorm | Site zeroscience.mk

ICL ScadaFlex II SCADA Controllers SC-1/SC-2 version 1.03.07 is vulnerable to unauthenticated file write/overwrite and deletion. This allows an attacker to execute critical file CRUD operations on the device that can potentially allow system access and impact availability.

tags | exploit
advisories | CVE-2022-25359
SHA-256 | 692f4de735fbbad8010644968c54cdfe4e595dc3154860210526aa667a9f2e0c
H3C SSL VPN Username Enumeration
Posted Feb 14, 2022
Authored by LiquidWorm | Site zeroscience.mk

H3C SSL VPN suffers from a username enumeration vulnerability during the login sequence.

tags | exploit
SHA-256 | dfee4cf29211a5243ad88690480fda707d2c3e7a7d71e2ad687f07a80c49882e
Fetch Softworks Fetch FTP Client 5.8 Denial Of Service
Posted Jan 28, 2022
Authored by LiquidWorm | Site zeroscience.mk

Fetch Softworks Fetch FTP Client version 5.8 suffers from a remote CPU consumption denial of service vulnerability.

tags | exploit, remote, denial of service
SHA-256 | 39661448198dd708a96b67957a59b551619e612105aace960d22e309d08ca49d
OpenBMCS 2.4 Secret Disclosure
Posted Jan 17, 2022
Authored by LiquidWorm | Site zeroscience.mk

OpenBMCS version 2.4 suffers from a secret disclosure vulnerability.

tags | exploit
SHA-256 | a40e30c16f0d2888ff426295f31b93b41116fcc4eb79213fafc80f0a5c06510b
OpenBMCS 2.4 Remote File Inclusion / Server-Side Request Forgery
Posted Jan 17, 2022
Authored by LiquidWorm | Site zeroscience.mk

OpenBMCS version 2.4 suffers from remote file inclusion and server-side request forgery vulnerabilities.

tags | exploit, remote, vulnerability, file inclusion
SHA-256 | 505b78cffe8b2f1b771d3702d316ef5c1753e49ac00b67466b0784a71a1ea915
OpenBMCS 2.4 Remote Privilege Escalation
Posted Jan 17, 2022
Authored by LiquidWorm | Site zeroscience.mk

OpenBMCS version 2.4 create administrator proof of concept exploit that leverages a remote privilege escalation vulnerability.

tags | exploit, remote, proof of concept
SHA-256 | dfa165d919105379e965f9f7c64bc72209b082357f408421bbd7348be571f7ea
OpenBMCS 2.4 SQL Injection
Posted Jan 17, 2022
Authored by LiquidWorm | Site zeroscience.mk

OpenBMCS version 2.4 suffers from an authenticated remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 3aeb898ad8ef01997d5126cc60a9a27460e4a21f989924b572387e47ffec85ff
OpenBMCS 2.4 Cross Site Request Forgery
Posted Jan 17, 2022
Authored by LiquidWorm | Site zeroscience.mk

OpenBMCS version 2.4 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 49761c5a766632d48b5e2db091385ef7d796cdc174fb58a9f84c48a390e63d92
meterN 1.2.3 Remote Command Execution
Posted Dec 14, 2021
Authored by LiquidWorm | Site zeroscience.mk

meterN version 1.2.3 suffers from an authenticated remote command execution vulnerability.

tags | exploit, remote
SHA-256 | d03478d19f799c6fe12536a7b5353c838ea40fb8825294f625cab67028553daa
Zucchetti Axess CLOKI Access Control 1.64 Cross Site Request Forgery
Posted Dec 14, 2021
Authored by LiquidWorm | Site zeroscience.mk

Zucchetti Axess CLOKI Access Control version 1.64 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 5ee851be27389c34fce6b6b8f31ca356b97517cee36216ebce3cf2a59bf0d6a4
i3 International Annexxus Cameras Ax-n 5.2.0 Application Logic Flaw
Posted Nov 2, 2021
Authored by LiquidWorm | Site zeroscience.mk

i3 International Annexxus Cameras Ax-n version 5.2.0 does not allow creation of more than one administrator account on the system. This also applies for deletion of the administrative account. The logic behind this restriction can be bypassed by parameter manipulation using dangerous verbs like PUT and DELETE and improper server-side validation. Once a normal account with viewer or operator permissions has been added by the default admin user i3admin, a PUT request can be issued calling the UserPermission endpoint with the ID of created account and set it to admin userType, successfully adding a second administrative account.

tags | exploit
SHA-256 | 3e641781592da07922dd7ee30daf5267b6d7f9b85ed06f3a2968275095a40591
Cypress Solutions CTM-200 2.7.1 Root Remote OS Command Injection
Posted Oct 11, 2021
Authored by LiquidWorm | Site zeroscience.mk

Cypress Solutions CTM-200 wireless gateway version 2.7.1 suffers from an authenticated semi-blind OS command injection vulnerability. This can be exploited to inject and execute arbitrary shell commands as the root user through the 'ctm-config-upgrade.sh' script leveraging the 'fw_url' POST parameter used in the cmd upgreadefw as argument, called by ctmsys() as pointer to execv() and make_wget_url() function to the wget command in /usr/bin/cmdmain ELF binary.

tags | exploit, arbitrary, shell, root
SHA-256 | 3c5b924eea85063a32d4abf12a102470e52fe008b637d8c375ec9d27c3e4f296
Cypress Solutions CTM-200/CTM-ONE Hard-Coded Credentials Remote Root
Posted Oct 11, 2021
Authored by LiquidWorm | Site zeroscience.mk

Cypress Solutions CTM-200/CTM-ONE suffers from a hard-coded credential remote root vulnerability via telnet and ssh.

tags | exploit, remote, root
SHA-256 | c6e807601e506777669f00a74526a7064066038cba2f8103bedd98cb559088c8
FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 Privilege Escalation
Posted Sep 28, 2021
Authored by LiquidWorm | Site zeroscience.mk

FatPipe Networks WARP/IPVPN/MPVPN version 10.2.2 suffers from a remote privilege escalation vulnerability.

tags | exploit, remote
SHA-256 | 6ef66ed70e92ad612290d98df48054d67d1c964e07a0683eaed0ee4abc38ad4e
FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 Backdoor Account
Posted Sep 28, 2021
Authored by LiquidWorm | Site zeroscience.mk

FatPipe Networks WARP/IPVPN/MPVPN version 10.2.2 has the hidden administrative account cmuser that has no password and has write access permissions to the device. The user cmuser is not visible in the Users menu list of the application.

tags | exploit
SHA-256 | 76986786233f93566ddb9953be6f98bfa450885a5ac241ed16617a8870a9ff2b
FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 Configuration Disclosure
Posted Sep 28, 2021
Authored by LiquidWorm | Site zeroscience.mk

FatPipe Networks WARP/IPVPN/MPVPN version 10.2.2 is vulnerable to an unauthenticated configuration disclosure when a direct object reference is made to the backup archive file using an HTTP GET request.

tags | exploit, web
SHA-256 | c9208e538a5afc70b3635572f890f2667c94de059d48740427d2b3abf186786c
FatPipe Networks WARP 10.2.2 Authorization Bypass
Posted Sep 28, 2021
Authored by LiquidWorm | Site zeroscience.mk

FatPipe Networks WARP version 10.2.2 suffers from an authorization bypass vulnerability.

tags | exploit, bypass
SHA-256 | d011bfaa75604c3b3dc63ad611330b11fc8a534120edc38f724e1a4f58929d87
FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 Cross Site Request Forgery
Posted Sep 28, 2021
Authored by LiquidWorm | Site zeroscience.mk

The application interface FatPipe Networks WARP/IPVPN/MPVPN version 10.2.2 allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.

tags | exploit, web
SHA-256 | 7e2119d2b169c3fb6fb1b259c686bac08187edd3b7de42bea6ab93a108d54445
COMMAX CVD-Axx DVR 5.1.4 Weak Default Credentials Stream Disclosure
Posted Aug 16, 2021
Authored by LiquidWorm | Site zeroscience.mk

COMMAX CVD-Axx DVR version 5.1.4 uses a weak set of default administrative credentials that can be easily guessed in remote password attacks and used to disclose the RTSP stream.

tags | exploit, remote
SHA-256 | b803657ac347af637721c0d8d6c1e09ad231eaf41d9ab12e4c4bac45075a5e15
COMMAX Smart Home Ruvie CCTV Bridge DVR Service Unauthenticated Config Write / DoS
Posted Aug 16, 2021
Authored by LiquidWorm | Site zeroscience.mk

COMMAX Smart Home Ruvie CCTV Bridge DVR Service suffers from unauthenticated configuration writing and denial of service vulnerabilities.

tags | exploit, denial of service, vulnerability
SHA-256 | 8890c32e87149f67b7a1b84524c7b4a4c6a2e5f6674351a154c33921586bfb06
COMMAX Smart Home Ruvie CCTV Bridge DVR Service RTSP Credential Disclosure
Posted Aug 16, 2021
Authored by LiquidWorm | Site zeroscience.mk

COMMAX Smart Home Ruvie CCTV Bridge suffers from a credential disclosure vulnerability.

tags | exploit
SHA-256 | 33e9a5c5cc3d38dfc956ed11d44560f9e260a3b7c50d3efbebab8513a5d0476c
COMMAX UMS Client ActiveX Control 1.7.0.2 Buffer Overflow
Posted Aug 16, 2021
Authored by LiquidWorm | Site zeroscience.mk

COMMAX UMS Client ActiveX Control version 1.7.0.2 suffers from a heap buffer overflow vulnerability.

tags | exploit, overflow, activex
SHA-256 | e327f8ce34f952bbed55392b1785a9ab4b15bb16ed92be4015504e303d2002c1
Page 4 of 35
Back23456Next

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    13 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    32 Files
  • 6
    Jun 6th
    39 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close