NUUO NVRmini, NVRmini2, Crystal and NVRSolo devices have a hidden PHP script that when called, a backdoor user is created with poweruser privileges that is able to read and write files on the affected device. The backdoor user 'bbb' when created with the password '111111' by visiting 'strong_user.php' script is able to initiate a secure shell session and further steal and/or destroy sensitive information.
762712a4d4cf07376dfbe5be76fe765c64b0e41a963c3e3ee8cf1adc2a139df4
NUUO versions 3.0.8 and below suffer from an arbitrary file deletion vulnerability.
9e8767c8a81d4d2f4ada22d067d595bb6714c5eb255bc16477a1f1f06054732b
NUUO NVRmini, NVRmini2, Crystal, NVRSolo suffer from an authenticated ShellShock vulnerability. This could allow an attacker to gain control over a targeted computer if exploited successfully. The vulnerability affects Bash, a common component known as a shell that appears in many versions of Linux and Unix.
ef1d911dbe025d8bee702808b48783938a47134cff1efcaa17e592ab23dbf552
NUUO versions 3.0.8 and below suffer from OS command injection vulnerabilities.
766ed57b6267f1b587beb017781a7ac4cf3bcaed211300fa70187e430d170219
NUUO versions 3.0.8 and below suffer from a file disclosure vulnerability.
559e7af56c757025a50061061b9df9456aeefc91c49d8277651b4079d54bd56b
NUUO versions 3.0.8 and below add administrator cross site request forgery exploit.
3ff69f9197c891e79d9ceed13705b1137a72ee07d9fb46755ec772aa3b00be51
NUUO NVRmini, NVRmini2, Crystal and NVRSolo suffer from an unauthenticated command injection vulnerability. Due to an undocumented and hidden debugging script, an attacker can inject and execute arbitrary code as the root user via the 'log' GET parameter in the '__debugging_center_utils___.php' script. Included is a remote root exploit and an nse file. Versions 3.0.8 and below are affected.
b66d478356e868e34ace9b79c69e9cf2c942faa4897cb0ba42a38a6df037596d
WordPress Ecwid Ecommerce Shopping Cart plugin versions 4.4 and 4.4.3 suffer from a PHP object injection vulnerability.
eea5dc338145f133ef2c948a11161b48b9195ae993992148222504ead33426e2
WordPress Welcome Announcement plugin version 1.0.5 suffers from a cross site scripting vulnerability.
3adbc8d73b043b019fcb2c9759f73edda0c3979c833e0cbcb58a64fe07bf92ce
Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.
8152a0445e29c66602489c064e42d4b1b2df67900a05980c0bc9a92c0de99be7
WordPress Selected Text Sharer plugin version 1.0 suffers from cross site request forgery and cross site scripting vulnerabilities.
061f67aca478de631a55246adeceaf848525e285099f1d8db9eb3cbc9fef7d41
Webfwlog is a Web-based firewall log reporting and analysis tool. It allows users to design reports to use on logged firewall data in whatever configuration they desire. Included are sample reports as a starting point. Reports can be sorted with a single click, or "drilled-down" all the way to the packet level, and saved for later use. Supported log formats are netfilter, ipfilter, ipfw, ipchains, and Windows XP. Netfilter support includes ulogd MySQL or PostgreSQL database logs using the iptables ULOG target.
cca8fad939651ba1b2b6cc3670de201c6b4b3e66091df7acafbb94caf3e4b4f1
Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.
5dbf6acdf3e5a4ff4631162997264d097818d469a016856fd4efa2894043e916
WordPress Store Locator Plus plugin version 4.5.09 suffers from a cross site scripting vulnerability.
43b65d3af62ae6aa76f632546f4154184dffe47668db8ba7c2c6611719d67b43
A DLL side loading vulnerability was found in the VMware Host Guest Client Redirector, a component of VMware Tools. This issue can be exploited by luring a victim into opening a document from the attacker's share. An attacker can exploit this issue to execute arbitrary code with the privileges of the target user. This can potentially result in the attacker taking complete control of the affected system. If the WebDAV Mini-Redirector is enabled, it is possible to exploit this issue over the internet.
a9ebf159096d5d370785b483c89286e459f55701477990b573fb428d268cfcc8
This is an exploit against Samsung Security Manager that bypasses the patch in CVE-2015-3435 by exploiting the vulnerability against the client side. This exploit has been tested successfully against IE, FireFox and Chrome by abusing a GET request XSS to bypass CORS and reach the vulnerable PUT. Finally, a traversal is used in the PUT request to upload the code just where we want it and gain Remote Code Execution as SYSTEM.
73f23908956d6ea94bcc26b81f8a3497f76a508c71653023ffa4e3ff18b4779e
This Metasploit module exploits the memory corruption vulnerability (CVE-2016-0189) present in the VBScript engine of Internet Explorer 11.
baac41ca9d882199ad0217dc7a6d8186ea7df1426e0d5a467c9dd7bc675441f5