accept no compromises
Showing 1 - 25 of 53 RSS Feed

Files

Samsung Security Manager 1.5 ActiveMQ Broker Service PUT Method Remote Code Execution
Posted Aug 6, 2016
Authored by mr_me | Site metasploit.com

This is an exploit against Samsung Security Manager that bypasses the patch in CVE-2015-3435 by exploiting the vulnerability against the client side. This exploit has been tested successfully against IE, FireFox and Chrome by abusing a GET request XSS to bypass CORS and reach the vulnerable PUT. Finally, a traversal is used in the PUT request to upload the code just where we want it and gain Remote Code Execution as SYSTEM.

tags | exploit, remote, code execution
advisories | CVE-2015-3435
MD5 | 12c0fc1de9392964d1fb7e3d45109b2d

Related Files

Samsung Devices KNOX Extensions OTP TrustZone Trustlet Stack Buffer Overflow
Posted Dec 14, 2016
Authored by Google Security Research

As a part of the KNOX extensions available on Samsung devices, Samsung provides a TrustZone trustlet which allows the generation of OTP tokens. The tokens themselves are generated in a TrustZone application within the TEE (UID: fffffffff0000000000000000000001e), which can be communicated with using the "OTP" service, published by "otp_server". Many of the internal commands supported by the trustlet must either unwrap or wrap a token. They do so by calling the functions "otp_unwrap" and "otp_wrap", correspondingly. Both functions copy the internal token data to a local stack based buffer before attempting to wrap or unwrap it. However, this copy operation is performed using a length field supplied in the user's buffer (the length field's offset changes according to the calling code-path), which is not validated at all. This means an attacker can supply a length field larger than the stack based buffer, causing the user-controlled token data to overflow the stack buffer. There is no stack cookie mitigation in MobiCore trustlets. On the device I'm working on (SM-G925V), the "OTP" service can be accessed from any user, including from the SELinux context "untrusted_app". Successfully exploiting this vulnerability should allow a user to elevate privileges to the TrustZone TEE.

tags | exploit, overflow, local
MD5 | 7ca93e4b9e68b1ccea14faa98806c21a
Samsung Repair Information Disclosure
Posted Sep 11, 2016
Authored by Justa Person

Samsung's repair system has ignored a researcher's plea to fix a flaw that allows attackers to brute force customer information.

tags | exploit, cracker
MD5 | 67b21d624c252c1ff6a2e56d91e52109
ELIGIBLEBACHELOR TOPSEC Firewall Exploit
Posted Aug 18, 2016

This is an exploit with an unclear attack vector for TOPSEC firewalls running TOS operating system versions 3.2.100.010, 3.3.001.050, 3.3.002.021 and 3.3.002.030. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. This archive also includes the BLATSTING implant that works in conjunction with this exploit.

tags | exploit
MD5 | 61c5f0a8dd65f04dbfafef2df36ae464
Samsung Smart Home Camera SNH-P-6410 Command Injection
Posted Aug 14, 2016
Authored by PenTest Partners | Site pentestpartners.com

Samsung Smart Home Camera SNH-P-6410 command injection exploit that sets a new root password.

tags | exploit, root
MD5 | 822fe27c75b9b79eb988623329ccd1de
Samsung Mobile Phone Telecom Denial Of Service
Posted Aug 4, 2016
Authored by 0xr0ot

Vulnerabilities in the SpamCall Activity components of the Samsung Telecom application can crash and reboot a device when a malformed serializable object is passed.

tags | advisory, denial of service, vulnerability
advisories | CVE-2016-6526, CVE-2016-6527
MD5 | 2d8e130dda2656e82b1e1f90ea793f43
Samsung SoftAP Weak Password
Posted Dec 18, 2015
Authored by Augusto Pereyra

Samsung's SoftAP WPA2-PSK password generation is weak and can be cracked in a few hours.

tags | advisory
advisories | CVE-2015-5729
MD5 | 8e6e1e6a07c89099c66cad01237c00ea
Samsung SyncThruWeb SMB Hash Disclosure
Posted Aug 31, 2015
Authored by Shad Malloy

Samsung SyncThruWeb suffers from an SMB hash disclosure vulnerability.

tags | exploit, info disclosure
MD5 | 2d978299a5089b10ca9d82ef7509bb1f
Samsung iPOLiS 1.12.2 ReadConfigValue Remote Code Execution
Posted Apr 15, 2015
Authored by Praveen Darshanam

Samsung iPOLiS version 1.12.2 ReadConfigValue heap spray remote code execution exploit.

tags | exploit, remote, code execution
advisories | CVE-2015-0555
MD5 | d1745be0d8ab3b5a910fe857592dd07f
Samsung iPolis Buffer Overflow
Posted Feb 21, 2015
Authored by Praveen Darshanam

Samsung iPolis suffers from a buffer overflow vulnerability in XnsSdkDeviceIpInstaller.ocx.

tags | exploit, overflow
advisories | CVE-2015-0555
MD5 | 93a69c03a007dca4e9b37490c79737b5
Samsung SmartViewer BackupToAvi 3.0 Remote Code Execution
Posted Jan 19, 2015
Authored by Praveen Darshanam

Samsung SmartViewer BackupToAvi 3.0 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2014-9265
MD5 | 4bdaec6e5163e772f168ca0c7adfcf3c
Samsung Galaxy KNOX Android Browser Remote Code Execution
Posted Nov 18, 2014
Authored by joev, Andre Moulu | Site metasploit.com

This Metasploit module exploits a vulnerability that exists in the KNOX security component of the Samsung Galaxy firmware that allows a remote webpage to install an APK with arbitrary permissions by abusing the 'smdm://' protocol handler registered by the KNOX component. The vulnerability has been confirmed in the Samsung Galaxy S4, S5, Note 3, and Ace 4.

tags | exploit, remote, arbitrary, protocol
MD5 | 9f057a9c3dab36565bdf001f5df0f7d1
Samsung.com Open Redirect
Posted Oct 12, 2014
Authored by Claudio Viviani

Samsung.com suffers from an open redirect vulnerability.

tags | exploit
MD5 | 80ca5c9cef80047ad7f6bf454bfe7f6d
Samsung Cross Site Scripting
Posted Jun 11, 2014
Authored by Robert Garcia

design.samsung.com suffered from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | e405ac0e6eb1da1f988a026c6a5827d1
Prestige Software CMS Local File Disclosure
Posted Sep 5, 2013
Authored by bie gabby

This is an exploit that leverages a local file disclosure vulnerability in systems running Prestige Software CMS in order to gain database information and credentials.

tags | exploit, local, info disclosure
MD5 | a65627350ffa3a9fb20df0cde552a8e5
Samsung DVR Authentication Bypass
Posted Aug 20, 2013
Authored by Andrea Fabrizi

Samsung DVRs put usernames and passwords base64 encoded into cookies. They also fail to validate the cookies in many places, so any values work, allowing for authentication bypass. A proof of concept exploit that lists all users and passwords is included.

tags | exploit, proof of concept, bypass
MD5 | 2b4dcb70387cbebcb1fc92c1e2470d57
Samsung TV Denial Of Service
Posted Jul 22, 2013
Authored by Malik Messelem

The DMCRUIS/0.1 web server on Samsung TVs suffers from a denial of service vulnerability.

tags | exploit, web, denial of service
advisories | CVE-2013-4890
MD5 | 255f52df7efa2179812c8d9457d0d0e0
Samsung Galaxy S3/S4 SMS Spoofing
Posted Jul 17, 2013
Authored by Z.X.

The Samsung Galaxy S3 and S4 phones come with a pre-loaded application that allows for spoofing and creation of arbitrary SMS content.

tags | advisory, arbitrary, spoof
advisories | CVE-2013-4764, CVE-2013-4763
MD5 | 4d798f1b865ddfda3b09cc7cdfb713b0
Samsung Series Cross Site Scripting
Posted Jun 13, 2013
Authored by Jonas Rapero Castillo

Samsung Series IP cameras suffer from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2013-3964
MD5 | 8c6846cf5a47240a8056d6729b42c4ca
Samsung Cross Site Scripting
Posted Jun 1, 2013
Authored by David Tapia

images.samsung.com suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | dc99e9d74c130b6f5f16c7217aa125dd
Samsung TV Denial Of Service
Posted Mar 6, 2013
Authored by AKAT-1, 22733db72ab3ed94b5f8a1ffcde850251fe6f466, c8e74ebd8392fda4788179f9a02bb49337638e7b

Samsung TVs suffer from a denial of service vulnerability.

tags | exploit, denial of service
MD5 | 17925dd5e2791b7c80a55dc6f6dbfca2
Samsung S3 Full Lock Screen Bypass
Posted Mar 5, 2013
Authored by Sean McMillan

The Samsung S3 suffers from a full locked screen bypass vulnerability that leverages the emergency call functionality.

tags | exploit, bypass
MD5 | 5a699bee9cb62494ef22f863d0bdedc6
Samsung Galaxy S3 Screen-Lock Bypass
Posted Feb 22, 2013
Authored by MTI Technology | Site mti.com

The Samsung Galaxy S3 w/ Android version 4.1.2 suffers from a bypass vulnerability due to S-Voice allowing the launch of any command even when the screen is locked.

tags | exploit, bypass
MD5 | 6bce91884ef328c823750cdc5df417c1
NVidia Display Driver Buffer Overflow
Posted Jan 18, 2013
Authored by Peter Winter-Smith, Sean de Regge

This is an exploit for a stack buffer overflow in the NVidia Display Driver Service. The service listens on a named pipe (\\pipe\\nsvr) which has a NULL DACL configured, which should mean that any logged on user or remote user in a domain context (Windows firewall/file sharing permitting) should be able to exploit this vulnerability. This is updated by Sean de Regge to target the 30 Aug 2012 nvvsvc.exe build.

tags | exploit, remote, overflow
systems | windows
MD5 | 09a2cbba01d4f77458184d45199aab55
Samsung Kies 2.5.0.12114_1 Buffer Overflow
Posted Jan 10, 2013
Authored by High-Tech Bridge SA | Site htbridge.com

Samsung Kies version 2.5.0.12114_1 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
MD5 | 94caa9b9edd96ebdf0971d49e0206633
NVidia Display Driver Buffer Overflow
Posted Dec 27, 2012
Authored by Peter Winter-Smith

This is an exploit for a stack buffer overflow in the NVidia Display Driver Service. The service listens on a named pipe (\pipe\nsvr) which has a NULL DACL configured, which should mean that any logged on user or remote user in a domain context (Windows firewall/file sharing permitting) should be able to exploit this vulnerability.

tags | exploit, remote, overflow
systems | windows
MD5 | 1be277706130b299d5676cf85ee08c9e
Page 1 of 3
Back123Next

File Archive:

September 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    5 Files
  • 2
    Sep 2nd
    5 Files
  • 3
    Sep 3rd
    3 Files
  • 4
    Sep 4th
    13 Files
  • 5
    Sep 5th
    16 Files
  • 6
    Sep 6th
    15 Files
  • 7
    Sep 7th
    20 Files
  • 8
    Sep 8th
    16 Files
  • 9
    Sep 9th
    4 Files
  • 10
    Sep 10th
    2 Files
  • 11
    Sep 11th
    15 Files
  • 12
    Sep 12th
    19 Files
  • 13
    Sep 13th
    20 Files
  • 14
    Sep 14th
    38 Files
  • 15
    Sep 15th
    31 Files
  • 16
    Sep 16th
    1 Files
  • 17
    Sep 17th
    7 Files
  • 18
    Sep 18th
    15 Files
  • 19
    Sep 19th
    40 Files
  • 20
    Sep 20th
    15 Files
  • 21
    Sep 21st
    15 Files
  • 22
    Sep 22nd
    10 Files
  • 23
    Sep 23rd
    1 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close