what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 2016-08-06 to 2016-08-07

NUUO 3.0.8 strong_user.php Backdoor Remote Shell Access
Posted Aug 6, 2016
Authored by LiquidWorm | Site zeroscience.mk

NUUO NVRmini, NVRmini2, Crystal and NVRSolo devices have a hidden PHP script that when called, a backdoor user is created with poweruser privileges that is able to read and write files on the affected device. The backdoor user 'bbb' when created with the password '111111' by visiting 'strong_user.php' script is able to initiate a secure shell session and further steal and/or destroy sensitive information.

tags | exploit, shell, php
SHA-256 | 762712a4d4cf07376dfbe5be76fe765c64b0e41a963c3e3ee8cf1adc2a139df4
NUUO 3.0.8 Arbitrary File Deletion
Posted Aug 6, 2016
Authored by LiquidWorm | Site zeroscience.mk

NUUO versions 3.0.8 and below suffer from an arbitrary file deletion vulnerability.

tags | exploit, arbitrary
SHA-256 | 9e8767c8a81d4d2f4ada22d067d595bb6714c5eb255bc16477a1f1f06054732b
NUUO NVRmini 2 NE-4160 ShellShock Remote Code Execution
Posted Aug 6, 2016
Authored by LiquidWorm | Site zeroscience.mk

NUUO NVRmini, NVRmini2, Crystal, NVRSolo suffer from an authenticated ShellShock vulnerability. This could allow an attacker to gain control over a targeted computer if exploited successfully. The vulnerability affects Bash, a common component known as a shell that appears in many versions of Linux and Unix.

tags | exploit, shell, bash
systems | linux, unix
SHA-256 | ef1d911dbe025d8bee702808b48783938a47134cff1efcaa17e592ab23dbf552
NUUO 3.0.8 OS Command Injection
Posted Aug 6, 2016
Authored by LiquidWorm | Site zeroscience.mk

NUUO versions 3.0.8 and below suffer from OS command injection vulnerabilities.

tags | exploit, vulnerability
SHA-256 | 766ed57b6267f1b587beb017781a7ac4cf3bcaed211300fa70187e430d170219
NUUO 3.0.8 Local File Disclosure
Posted Aug 6, 2016
Authored by LiquidWorm | Site zeroscience.mk

NUUO versions 3.0.8 and below suffer from a file disclosure vulnerability.

tags | exploit
SHA-256 | 559e7af56c757025a50061061b9df9456aeefc91c49d8277651b4079d54bd56b
NUUO 3.0.8 Add Admin Cross Site Request Forgery
Posted Aug 6, 2016
Authored by LiquidWorm | Site zeroscience.mk

NUUO versions 3.0.8 and below add administrator cross site request forgery exploit.

tags | exploit, csrf
SHA-256 | 3ff69f9197c891e79d9ceed13705b1137a72ee07d9fb46755ec772aa3b00be51
NUUO 3.0.8 Remote Root
Posted Aug 6, 2016
Authored by LiquidWorm | Site zeroscience.mk

NUUO NVRmini, NVRmini2, Crystal and NVRSolo suffer from an unauthenticated command injection vulnerability. Due to an undocumented and hidden debugging script, an attacker can inject and execute arbitrary code as the root user via the 'log' GET parameter in the '__debugging_center_utils___.php' script. Included is a remote root exploit and an nse file. Versions 3.0.8 and below are affected.

tags | exploit, remote, arbitrary, root, php
SHA-256 | b66d478356e868e34ace9b79c69e9cf2c942faa4897cb0ba42a38a6df037596d
WordPress Ecwid Ecommerce Shopping Cart 4.4 / 4.4.3 PHP Object Injection
Posted Aug 6, 2016
Authored by Yorick Koster, Securify B.V.

WordPress Ecwid Ecommerce Shopping Cart plugin versions 4.4 and 4.4.3 suffer from a PHP object injection vulnerability.

tags | advisory, php
SHA-256 | eea5dc338145f133ef2c948a11161b48b9195ae993992148222504ead33426e2
WordPress Welcome Announcement 1.0.5 Cross Site Scripting
Posted Aug 6, 2016
Authored by bl4ck_MohajeM

WordPress Welcome Announcement plugin version 1.0.5 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 3adbc8d73b043b019fcb2c9759f73edda0c3979c833e0cbcb58a64fe07bf92ce
Stegano 0.6
Posted Aug 6, 2016
Authored by Cedric Bonhomme | Site github.com

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

Changes: Command-line improvements.
tags | tool, encryption, steganography, python
systems | unix
SHA-256 | 8152a0445e29c66602489c064e42d4b1b2df67900a05980c0bc9a92c0de99be7
WordPress Selected Text Sharer 1.0 CSRF / XSS
Posted Aug 6, 2016
Authored by bl4ck_MohajeM

WordPress Selected Text Sharer plugin version 1.0 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 061f67aca478de631a55246adeceaf848525e285099f1d8db9eb3cbc9fef7d41
Web-Based Firewall Logging Tool 1.1.0
Posted Aug 6, 2016
Authored by Bob Hockney | Site webfwlog.sourceforge.net

Webfwlog is a Web-based firewall log reporting and analysis tool. It allows users to design reports to use on logged firewall data in whatever configuration they desire. Included are sample reports as a starting point. Reports can be sorted with a single click, or "drilled-down" all the way to the packet level, and saved for later use. Supported log formats are netfilter, ipfilter, ipfw, ipchains, and Windows XP. Netfilter support includes ulogd MySQL or PostgreSQL database logs using the iptables ULOG target.

Changes: Added support for MaxMind geoip version 2 location databases. Added config option for postgresql join_collapse_limit for query planner. Various other updates.
tags | tool, web, firewall
systems | linux, windows
SHA-256 | cca8fad939651ba1b2b6cc3670de201c6b4b3e66091df7acafbb94caf3e4b4f1
Falco 0.3.0
Posted Aug 6, 2016
Authored by Sysdig | Site sysdig.org

Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

Changes: Significantly improved performance, involving changes in the falco and sysdig repositories. Several sets of rule cleanups to reduce false positives. Various other updates.
tags | tool, intrusion detection
systems | unix
SHA-256 | 5dbf6acdf3e5a4ff4631162997264d097818d469a016856fd4efa2894043e916
WordPress Store Locator Plus 4.5.09 Cross Site Scripting
Posted Aug 6, 2016
Authored by Yorick Koster, Securify B.V.

WordPress Store Locator Plus plugin version 4.5.09 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 43b65d3af62ae6aa76f632546f4154184dffe47668db8ba7c2c6611719d67b43
VMware Host Guest Client Redirector DLL Hijacking
Posted Aug 6, 2016
Authored by Yorick Koster, Securify B.V.

A DLL side loading vulnerability was found in the VMware Host Guest Client Redirector, a component of VMware Tools. This issue can be exploited by luring a victim into opening a document from the attacker's share. An attacker can exploit this issue to execute arbitrary code with the privileges of the target user. This can potentially result in the attacker taking complete control of the affected system. If the WebDAV Mini-Redirector is enabled, it is possible to exploit this issue over the internet.

tags | advisory, arbitrary
systems | windows
SHA-256 | a9ebf159096d5d370785b483c89286e459f55701477990b573fb428d268cfcc8
Samsung Security Manager 1.5 ActiveMQ Broker Service PUT Method Remote Code Execution
Posted Aug 6, 2016
Authored by mr_me | Site metasploit.com

This is an exploit against Samsung Security Manager that bypasses the patch in CVE-2015-3435 by exploiting the vulnerability against the client side. This exploit has been tested successfully against IE, FireFox and Chrome by abusing a GET request XSS to bypass CORS and reach the vulnerable PUT. Finally, a traversal is used in the PUT request to upload the code just where we want it and gain Remote Code Execution as SYSTEM.

tags | exploit, remote, code execution
advisories | CVE-2015-3435
SHA-256 | 73f23908956d6ea94bcc26b81f8a3497f76a508c71653023ffa4e3ff18b4779e
Internet Explorer 11 VBScript Engine Memory Corruption
Posted Aug 6, 2016
Authored by Theori | Site metasploit.com

This Metasploit module exploits the memory corruption vulnerability (CVE-2016-0189) present in the VBScript engine of Internet Explorer 11.

tags | exploit
advisories | CVE-2016-0189
SHA-256 | baac41ca9d882199ad0217dc7a6d8186ea7df1426e0d5a467c9dd7bc675441f5
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close