exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 30 RSS Feed

Files

Skype For Business 2013 User Enumeration
Posted Jun 17, 2016
Authored by nyxgeek

Skype for Business 2013 suffers from a user enumeration timing attack vulnerability.

tags | exploit
SHA-256 | dedc70fffc5ea2d07f68d69fbe8ae570b34e97daacc51b72c8224705bb509cbc

Related Files

Microsoft Skype For Business DNS Query
Posted Dec 6, 2019
Authored by Alphan Yavas

Microsoft Skype for Business latest versions affected from external service interaction (DNS) vulnerability. A remote attacker could force the vulnerable server to send DNS request to any remote server attacker wants.

tags | exploit, remote
SHA-256 | 31dcf21797598a1609a11a0a94cb747057677e0445801e5894f06e082761eb09
Microsoft Skype 2015 / 2016 Denial Of Service
Posted Nov 21, 2018
Authored by Sabine Degen | Site sec-consult.com

A large number of emojis received in one message by the Skype For Business client freezes the program for a few seconds. This can be exploited to perform denial of service attacks against Skype for Business users and compromises the availability of the program. Affected includes Skype for Business 2015 (Lync 2013) before version 15.0.5075.1000 and Skype for Business 2016 before version 16.0.4756.1000.

tags | exploit, denial of service
advisories | CVE-2018-8546
SHA-256 | 6f0b4e1f98c61b5c68a056d607be3d7b4027bbb364d50f953833abd9b9e26d5d
Skype On Debian Microsoft Apt Repo Addition
Posted Sep 28, 2018
Authored by Enrico Weigelt

Skype on Debian automatically installs apt configuration that adds Microsoft's apt repo to the system's package sources. That way, Microsoft (or anybody holding their repo's private key) can easily inject malicious packages via regular update and replace distro packages w/ their own manipulated ones.

tags | advisory
systems | linux, debian
SHA-256 | 1af0ce7e985b6e6fa65956ab99747246fc9ef0fec3fb8d2b6a3f4313086f54c4
Skype Empresarial Office 365 16.0.10730.20053 Denial Of Service
Posted Aug 31, 2018
Authored by Samuel Cruz

Skype Empresarial Office 365 version 16.0.10730.20053 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 3e7987d784144b91aefb2a14f3e9d598157afc82ba38c417a05ee061228b522d
SkypeApp 12.8.487.0 Denial Of Service
Posted Aug 24, 2018
Authored by Luis Martinez

SkypeApp version 12.8.487.0 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 74a0008f25cf7019c32e06ec014fd9992cd08c5c5a6223d52d89765199e85dcd
Skype 7.16.0.102 DLL Hijacking
Posted Mar 15, 2017
Authored by Sachin Wagh

Skype version 7.16.0.102 suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
advisories | CVE-2017-6517
SHA-256 | 011f971bdb45d821640b52a50a8840eef5c6b5fec316c457347aa001a208a0da
Skype DLL Hijacking
Posted Sep 27, 2016
Authored by Tien Phan

The Skype installer suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | 0b3c640eeab0ab7cd7ec7ebff214b1a4bceb0e0789d4d92e6c3110b0a6a3749a
Skype Content Spoofing / Phishing
Posted May 11, 2016
Authored by Danny Kopping

Skype appears to possibly be susceptible to a content spoofing vulnerability.

tags | exploit, spoof
systems | linux
SHA-256 | 1818fa20690442196c2929353bf64fe6a49db93abd0c384a6575fe27f68fa6fd
SkypeFreak Forensic Tool
Posted Mar 21, 2014
Authored by Osanda Malith

This tool can be used to enumerate Skype users profiles, contacts, messages, and calls from the main.db file. This is automated easy to use application in which to perform forensic spelunking of Skype data.

tags | tool, forensics
SHA-256 | c5eb5f2d1fcead4e96207e4b85959a611b231d00883e83e72cbcb504f8e2d96d
Skype Click To Call 6.2.0.106 Privilege Escalation
Posted Mar 15, 2013
Authored by otr

The default installation of Skype is vulnerable to a local privilege escalation attack that allows an unprivileged attacker to execute arbitrary code with NT AUTHORITY/SYSTEM privileges. Versions 6.2.0.106 and below are affected.

tags | exploit, arbitrary, local
SHA-256 | d220809c5a2ec3bca6b7d83539650b12420bc8778406212fc05cd585e28a6a0f
Skype Hash Dumper 1.0
Posted Dec 29, 2012
Authored by Kevin Devine

This is a tool that demonstrates dumping MD5 password hashes from the configuration file in Skype.

tags | tool
SHA-256 | 1c5bf93ebc41bc95553af5a1fa8a89d8ada7ff8cb06b4f21db26e8a540ca2921
Skype 5.x.x Information Disclosure
Posted Feb 13, 2012

Even if a user has their security settings with no history enabled, Skype 5.x.x fails to securely remove chat messages stored in the sqlite3 database.

tags | exploit, info disclosure
SHA-256 | 71d5feb9cc956c726042c458e08a52e135cac25deae5200ce474ea31c5489a36
Skype VoIP Zero Day Exploitation
Posted Oct 20, 2011
Authored by Benjamin Kunz Mejri, Pim J.F. Campers

Whitepaper called Skype Voice Over IP Software Vulnerabilities, Techniques and Methods - Zero Day Exploitation 2011.

tags | paper, vulnerability
SHA-256 | b0175858820b9e6438b1ec0ef4a41eeaa2957167c87f13ca78bade3f36b4401a
Skype VoIP 5.2.x / 5.3.x Memory Corruption
Posted Aug 23, 2011
Authored by Benjamin Kunz Mejri | Site vulnerability-lab.com

A critical pointer vulnerability is located in the Mac OS X and Windows versions of Skype. The bug is located in 2 input forms of a unicode HTTP search request to the Skype search directory server. The vulnerability allows a local attacker to crash the complete Skype process via an unknown unhandled software exception. The bug allows a local attacker to overwrite or read a new address (skype_debug2_win7_x64x.png).

tags | advisory, web, local
systems | windows, apple, osx
SHA-256 | ecad962852550d791ca6abfe3c2523e48124d32e8c4270d0824d797e4340408b
Skype 5.5.0.113 Cross Site Scripting
Posted Aug 18, 2011
Authored by noptrix | Site nullsecurity.net

Skype versions 5.5.0.113 and below on Windows suffers from HTML and Javascript injection vulnerabilities.

tags | exploit, javascript, vulnerability, xss
systems | windows
SHA-256 | 2c528e6e8bc01de1bd0fc12e3f7250aa305dc496eec675d266f122e65a63097d
Skype 5.3.0.120 Cross Site Scripting
Posted Jul 13, 2011
Authored by noptrix | Site nullsecurity.net

Skype versions 5.3.0.120 and below suffer from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 6502c1a5c7b0f0b745b272603838a61f211ef0fcd561fff81c2468592c539233
Skype Remote Scripting Injection
Posted May 8, 2011
Authored by Rohit Bansal | Site secniche.org

This advisory discusses a re mote scripting injection issue with Skype on Mac OS X.

tags | advisory
systems | apple, osx
SHA-256 | 709d209d6b139b30f4f885a39c7413251dcb2f639592c6e221e4bcd8027a2517
Skype 4.2.0.169 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Glafkos Charalambous

Skype versions 4.2.0.169 and below DLL hijacking exploit that leverages wab32.dll.

tags | exploit
SHA-256 | 1dc9ab9214f52af84cad865cee20c04573afdca03114518ac2f62b433d256a0e
Skype Client For Mac Chat Unicode Denial Of Service
Posted Jun 23, 2010
Authored by Marc Ruef | Site scip.ch

The Skype client for Mac Chat suffers from a unicode related denial of service vulnerability.

tags | advisory, denial of service
SHA-256 | f948952222defade88deecce448672cc4c9753535691afb7597dc9381db5ac14
An Analysis Of The Skype IMBot Logic And Functionality
Posted Mar 16, 2010
Authored by Christian Wojner, L. Aaron Kaplan

Whitepaper called An Analysis of the Skype IMBot Logic and Functionality.

tags | paper
SHA-256 | 2d29fd8a23eb7307b687f82418e8cb93f8c1f548a9d18512a96cbfed010aa84f
Skype URI Handler Input Validation
Posted Mar 11, 2010
Authored by Paul Craig | Site security-assessment.com

Skype client versions prior to 4.2.0.1.55 suffer from a URI handling input validation vulnerability that allows for remote command execution.

tags | exploit, remote
SHA-256 | faa86373432c9b156df0c665dcd6633b96c306a1b1b24a4aa08c75976837f5d5
Skype For Linux Denial Of Service / HTML Injection
Posted Jan 4, 2010
Authored by crossbower, emgent

Skype for Linux versions 2.1 Beta and below suffer from some odd denial of service and html injection issues that can assist phishing attacks.

tags | exploit, denial of service
systems | linux
SHA-256 | 81e0e2ceda585f48185b028e2f3564d52d7f78e982636a47edc12a681c5dcb5f
Megapanzer Skype Trojan Source
Posted Aug 26, 2009
Authored by Ruben Unteregger

This is the source code for the Skype Superintendent Trojan. It injects function calls into the Skype process to intercept all audio data coming and going to the Skype process. It extracts the PCM audio data, converts it to MP3 and sends it to the attacker after encrypting it.

tags | exploit, trojan
SHA-256 | 50398ad61e00692c92dd2314b4361cbb17e4a9e0f3004de10cacb297e3951d03
Skype Bruteforcer
Posted Feb 1, 2009
Authored by matrix killer

Simple Skype account brute forcing utility written in Perl.

tags | cracker, perl
SHA-256 | 3b0f91f8c01c5c49815e3606b3b5677bab209b352ad2741a5ede24884a1c24c5
skype-poc.txt
Posted Oct 7, 2008
Authored by irk4z

Skype extension for Firefox BETA version 2.2.0.95 Clipboard writing vulnerability proof of concept exploit.

tags | exploit, proof of concept
SHA-256 | ee237e2cea9bdff0960bd5afa285e1bb07fb40ab0f22feaaa628dee620ccc801
Page 1 of 2
Back12Next

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    5 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    0 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close