what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 151 - 175 of 537 RSS Feed

Files from Benjamin Kunz Mejri

Email addressbkm at vulnerability-lab.com
First Active2011-08-23
Last Active2020-12-04
Photos In Wifi 1.0.1 File Upload
Posted Sep 28, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Photos in Wifi version 1.0.1 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 4a00b037a1dc3051f06630d1a90f45ed20afc5751a1f8f286020dfd2832f6a2b
My.WiFi USB Drive 1.0 File Inclusion
Posted Sep 28, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

My.WiFi USB Drive version 1.0 suffers from a file inclusion vulnerability.

tags | exploit, file inclusion
SHA-256 | 291d895c909d0e7e884d9e3475bc4fd0693023383eef111c66707bcae766d782
Flowdock API Script Insertion
Posted Sep 28, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Flowdock API suffers from a malicious script insertion vulnerability.

tags | exploit
SHA-256 | a3b7855c7e90fcf4c75103af35130d53982d9d62505e762c85e860f5faf3646d
WiFi Drive CR 1.0 Script Insertion
Posted Sep 24, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

WiFi Drive CR version 1.0 suffers from a file upload vulnerability that allows for malicious script execution.

tags | exploit, file upload
SHA-256 | 6f4c0e90400ddb9bc62a317bbf688b4b45f93981ac1ef7a4dd8e7ff43d6ad413
Air Drive Plus 2.4 Arbitrary File Upload
Posted Sep 22, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Air Drive Plus version 2.4 suffers from an arbitrary file upload vulnerability.

tags | exploit, arbitrary, file upload
SHA-256 | 45b2bdfb1779aed0c438a06dfdc962185d60accb980272d0f874c01194cbced9
UDID 1.0 Script Injection
Posted Sep 22, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

UDID version 1.0 suffers from a persistent mail encoding vulnerability that allows for script injection.

tags | exploit
SHA-256 | bceca9f113e5c423a0b3c8001f9d90a113dcbd637c3da7bc1db7f038a0018c2a
PayPal Authentication Bypass
Posted Sep 2, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

The Vulnerability Laboratory Core Research Team discovered a restriction filter bypass in the official PayPal Inc Mobile API for Apple iOS.

tags | advisory
systems | cisco, apple, ios
SHA-256 | aebf28b1409e41a13475d9756d4f6dcf370b04518d3a09a7f95d6ed6787c1200
Photo Transfer 2 1.0 Denial Of Service
Posted Aug 28, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Photo Transfer 2 version 1.0 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 368ca11913bbeb4d94a623944cf3e7c3b1a4042d78d4ba52a188f2e5f763a61d
Device Inspector 1.5 Command Injection
Posted Aug 8, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Device Inspector version 1.5 suffers from command injection vulnerabilities.

tags | exploit, vulnerability
SHA-256 | e99a3f31120fa704776eff418bbfa76394c0c8c55bb89466f21c1933eb8d2af7
UDID+ 2.5 Command Injection
Posted Jul 17, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

UDID+ version 2.5 suffers from a command injection vulnerability.

tags | exploit
SHA-256 | 761145c7197c1353abee758af1de37e76bf21669162d014b72a9a6a9cc8cb015
FoxyCart Filter Bypass
Posted Jul 17, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

FoxyCart suffers from filter bypass and input validation vulnerabilities.

tags | exploit, vulnerability
SHA-256 | 718fd95d80edef23b0352b7f8154fc54cb785b8980a88329772638cb021700da
WK UDID 1.0.1 Command Injection
Posted Jul 6, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

WK UDID version 1.0.1 suffers from a command injection vulnerability.

tags | exploit
SHA-256 | 92265986e2f75ed3b342490966f7eeba2d2cde8d0548087e8f2e6eb2b30742b0
FCS Scanner 1.0 / 1.4 Command Injection
Posted Jul 2, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

FCS Scanner versions 1.0 and 1.4 suffer from a command injection vulnerability.

tags | exploit
SHA-256 | c203562981c87442f0f5d78a67b99c67b04b6d2b7af9804caf334439ab44ca57
Pinterest Persistent Mail Encoding Issue
Posted Jul 2, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Pinterest suffered from a persistent mail encoding issue in contact_name.

tags | exploit
SHA-256 | 4fd93c3f0a05f97fb00923f7031868a46a85830b07a36031006b08aa903b60dc
Heroku Session Validation Issue
Posted Jun 11, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

An application-side re-auth session bypass vulnerability has been discovered in the official Heroku API and web-application service. The vulnerability allows an attacker to request unauthorized information without the second forced re-authentication module.

tags | exploit, web, bypass
SHA-256 | c42e20e6af494c024a32d6288be639d91cf860dcc07122b0e4ede8924d4698c8
Bashi 1.6 Script Insertion
Posted May 25, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Bashi version 1.6 suffers from a malicious script insertion vulnerability.

tags | exploit
SHA-256 | 712e2b7af451c8707b300f6092dfeea924aaf32185aec96947ad335dc5840e19
HiDisk 2.4 Cross Site Scripting
Posted May 20, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

HiDisk version 2.4 suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 64d72136f12d344f723dc4b373e08c6d1dbf2f416063afa99305e3907efcb50b
Eisbar SCADA Script Insertion
Posted May 20, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Eisbar SCADA suffers from a malicious script insertion vulnerability.

tags | exploit
SHA-256 | 3f1cea9f753def53e8d70f200ac4d5ac34877802ee86b77b0d601b26e3a86fb9
Wireless Photo Transfer 3.0 Local File Include
Posted May 19, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

The Vulnerability Laboratory Research Team discovered a local file include vulnerability in the official Wireless Photo Transfer Mobile version 3.0 iOS application.

tags | advisory, local
systems | apple
SHA-256 | 8c45956de7bbff8e824ef289258164e1927f4f4d9ddcc638bb142469272f0b3b
OYO File Manager 1.1 LFI / Command Injection / Traversal
Posted May 18, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

OYO File Manager version 1.1 suffers from local file inclusion, command injection, and directory traversal vulnerabilities.

tags | exploit, local, vulnerability, file inclusion
SHA-256 | fe85738f1eab7c8cfd878542f88a4991a2d514748244ffcea4f4f4c22b56c5d9
Facebook Filter Evasion / Open Redirect
Posted May 18, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Facebook suffered from filter evasion and open redirection vulnerabilities.

tags | exploit, vulnerability
SHA-256 | 32ed60b541458088021184ce1c05f957aaa159bf25704ab3c0a004ad152f9f56
Album Streamer 2.0 Directory Traversal
Posted May 7, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Album Streamer version 2.0 suffers from a directory traversal vulnerability.

tags | exploit
SHA-256 | 995d2525bb3241f1583292b68d3c8c8775795290d25f56847b605bfdbe66e42e
PDF Converter And File Editor 2.1 Local File Inclusion
Posted May 7, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

PDF Converter and File Editor version 2.1 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | d4803b251347401ae6c2425b77c15232e43078278304e16a1fe2dcd08f5fc5a7
Oracle Business Intelligence Mobile HD 11.x Script Insertion
Posted May 7, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Oracle Business Intelligence Mobile HD version 11.x suffers from a persistent script insertion vulnerability.

tags | exploit
SHA-256 | 696e949d879961b6eec6787d43c69bf13142b53172357c59d94eb02ca6214849
Grindr 2.1.1 Breach Attack
Posted May 7, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Grindr version 2.1.1 has been found susceptible to the breach attack.

tags | exploit
SHA-256 | c290a215a6fb335ae34ca6896d60242350ccf436e31821e5607aab4bf2f0074e
Page 7 of 22
Back56789Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    21 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close