Team Helpdesk Customer Web Service (CWS) and Technician Web Access (TWA) version 8.3.5 credential dump exploits that produce encrypted pairs. Decryption scripts are also included.
b55a0fca18653e17666a9e18f599993836259cbba81d9aa9c67cde5f0dde607b
This Metasploit module exploits an unquoted parameter call within the Teamviewer URI handler to create an SMB connection to an attacker controlled IP. TeamViewer < 8.0.258861, 9.0.258860, 10.0.258873, 11.0.258870, 12.0.258869, 13.2.36220, 14.2.56676, 14.7.48350, and 15.8.3 are vulnerable. Only Firefox can be exploited by this vulnerability, as all other browsers encode the space after play and before the SMB location, preventing successful exploitation. Teamviewer 15.4.4445, and 8.0.16642 were successfully tested against.
f3e46fc5757cf4b5e287b46bfee79b86257118c40dccdb52dda71fbc81fbcd57
This Metasploit module retrieves user credentials from BearWare TeamTalk. Valid administrator credentials are required. This Metasploit module has been tested successfully on TeamTalk versions 5.2.2.4885 and 5.2.3.4893.
543a575692c7a6d5bf4f81a65d2fe8485849c21c68fc2624a2eb433643de1eb6
TeamSpeak version 3.5.6 suffers from an insecure file permissions vulnerability.
12811c3a63efea6cc0c965e23726fa73a17966c671c7a4a33df7628dac5f3e10
TeamCity versions prior to 9.0.2 disable registration bypass exploit.
fcb62b72b48409cfdc2655e2eed9a673ab05cc58972b99fe8dd0345c657202bd
Teameyo Project Management System version 1.0 suffers from a remote SQL injection vulnerability.
de8a454383209de1eb526d46e493b086d0277e6d7b417e80f5bdbf37d80e4eb6
This Metasploit module allows remote code execution on TeamCity Agents configured to use bidirectional communication via xml-rpc. In bidirectional mode the TeamCity server pushes build commands to the Build Agents over port TCP/9090 without requiring authentication. Up until version 10 this was the default configuration. This Metasploit module supports TeamCity agents from version 6.0 onwards.
ffd2452cfe0fe12ebc398f9f6cfab3dbddb89ea510ff981650c645bb1237db0f
TeamViewer App version 13.0.100.0 suffers from a denial of service vulnerability.
7dcff94958ca31558f88ef263293d405690cd94fdbc94e58066bceae470b8dea
TeamCity version 2017.1.5 suffers from a local privilege escalation vulnerability due to weak file permissions.
0913f2e23a971d20e093097a088ef441a13e947630d443ec627bcc5a4b0cdb61
TeamSpeak client version 3.1.4 suffers from a buffer overflow vulnerability.
bb2aca0ac5b132b5684e64c193761621080257dcc054447d01adb636cafa22c8
TeamViewer version 11.0.65452 (64bit) suffers from a local credential memory disclosure vulnerability.
5df2ccec7663ba0f0db19fc8e94dcd8bbd953bc3a84ecee19c4c70a3b12659da
Teamspeak 3 suffers from multiple vulnerabilities including denial of service, a race condition that leads to a use-after-free, and various other issues.
690a5d7c6af1c3972f1a035ae40ef95b54f43f342ca937f2673b022a2e1f0371
TeamPass Passwords Management System versions 2.1.26 and below suffer from an unauthenticated arbitrary file download vulnerability.
a6f938983c6627ce76219ba9164c73d23d86783ad91a0f97d30fe23dfba8b5cb
TeamSpeak Client version 3.0.14 suffers from a buffer overflow vulnerability.
295b37f295776501806fbc213aa99959eb696a5c44acb220c32bbb53d6a614b2
TeamMate Audit Management Software Suite DLL hijacking exploit.
513327618ac8756646178f1c4048f7a241d4988a8bf12c0c6331fa4a0a321f87
TeamViewer versions 5.0.8703 and below DLL hijacking exploit that leverages dwmapi.dll.
3ece1b22e3648333ee095b7f7528a9bc1ff3439a63ff9a0d683a8283e377deb5
TeamViewer version 5.0.8232 remote buffer overflow proof of concept exploit.
eb3b4275204e3eb34a3eee73ff80bc30dc6a1ff82440af7000f547ec3b909b22
Linux Kernel versions 2.6.34-rc3 and below ReiserFS xattr privilege escalation exploit.
ec3e3da22ac58162ce7be7447d104d5ca1384de9ba4a5958c34ad37d6cb977dc
Team Board suffers from database disclosure and cross site scripting vulnerabilities.
fdb547a4f03315b5a1e23fb354a1bdc5522298d29d6f6a276c0dfd8906db3703
TeamSpeak versions 2.0.23.17 and below suffer from a remote file disclosure vulnerability.
8894836c9f7a3fab509a99e94dc4f91689d114dd68dfe84f6e662dd15d6fad66
TeamCalpro version 3.1.000 suffers from multiple remote and local file inclusion vulnerabilities.
fa6a44799e1e4b8613a1ad575826a2dc2758dd7d79a8283866184ce5c0888dfe
TeamSpeak version 2.0 remote denial of service exploit for the Windows release.
e9286e83ecade05fd7ec3415fe8cb3afdd022f4354aec94004df50d9ae0b38f0
Analysis whitepaper detailing Cyber-terrorism defacement attacks on pro-Israeli servers by Team Evil.
b5c0b1a8f42634e6f235bab6d79b65c54bd1315b316a4aad456f35821a58aaa9
Team Factor versions 1.25 and below are susceptible to a remote server crash. Both the Windows and Linux platforms are affected.
ecf6ae877cd6f230a6ca6cfcb248d330cfbe231379638e55923f3b71bcf037f3
Word list created from sports team names. (141 words)
1abebb39ffc6fbc7fd75fb49928e5b1cde3844189471f6f38cc364db6226d711