exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 100 RSS Feed

Files

QNAP QTS 4.2.1 Build 20160601 Arbitrary File Overwrite
Posted Aug 18, 2016
Authored by Sebastian Nerz | Site syss.de

QNAP QTS version 4.2.1 Build 20160601 suffers from an arbitrary file overwrite vulnerability.

tags | exploit, arbitrary
SHA-256 | 1b6b302fa261390c5f0c6aa9787378c2eaa3685d815a17a90ab3bfb40b207096

Related Files

perfact::mpa Persistent Cross Site Scripting
Posted Mar 1, 2016
Authored by Matthias Deeg, Sven Freund | Site syss.de

The SySS GmbH found out that different functions of the web application perfact::mpa are prone to persistent cross-site scripting attacks due to insufficient user input validation.

tags | exploit, web, xss
SHA-256 | 3de9ebd0a6d7d71bc98db0dbfca47d2036e6cb55c8c5730f0710bc34b796c3d7
perfact::mpa Insecure Direct Object Reference
Posted Mar 1, 2016
Authored by Matthias Deeg, Sven Freund | Site syss.de

The SySS GmbH found out that different resources of the web application perfact::mpa can be directly accessed by the correct URL due to improper user authorization checks. That is, unauthorized users can access different functions of the perfact::mpa web application.

tags | exploit, web
SHA-256 | 9ddb061b9a0b9ab1cc362d42499ce13c2180721efde797ef3793f8df0246c9b2
perfact::mpa Open Redirect
Posted Mar 1, 2016
Authored by Matthias Deeg, Sven Freund | Site syss.de

The SySS GmbH found out that the web application perfact:mpa accepts user-controlled input via the URL parameter "redir" that can be used to redirect victims to an arbitrary site which simplifies so-called phishing attacks.

tags | exploit, web, arbitrary
SHA-256 | 1240006c91f037df38cbcd2cbcc641d8f0ac32f2445fa4d65f159730f692deb7
perfact::mpa Insecure Direct Object Reference
Posted Mar 1, 2016
Authored by Matthias Deeg, Sven Freund | Site syss.de

The SySS GmbH found out that any logged in user is able to download valid VPN configuration files of arbitrary existing remote sessions. All an intruder needs to know is the URL with the dynamic parameter "brsessid". Due to the modification of this incremental increasing integer value, it is possible to enumerate and download a valid VPN configuration file for every existing remote session.

tags | exploit, remote, arbitrary
SHA-256 | 0395cba8a67f491b8450abca96173ea16da49abe7cd6b3f2d88cf3e02d04710c
perfact::mpa Cross Site Request Forgery
Posted Mar 1, 2016
Authored by Matthias Deeg, Sven Freund | Site syss.de

The tested web application perfact::mpa offers no protection against cross-site request forgery (CSRF) attacks. This kind of attack forces end users respectively their web browsers to perform unwanted actions in a web application context in which they are currently authenticated.

tags | exploit, web, csrf
SHA-256 | 2b1425b7f0db4e14f7b33d9778f0a59b7e1c1b93b42771c51ac1b69ae8116af3
perfact::mpa Insecure Direct Object Reference
Posted Mar 1, 2016
Authored by Matthias Deeg, Sven Freund | Site syss.de

SySS GmbH found out that unauthorized users are able to download arbitrary files of other users that have been uploaded via the file upload functionality. As the file names of uploaded files are incremental integer values, it is possible to enumerate and download all uploaded files without any authorization.

tags | exploit, arbitrary, file upload
SHA-256 | b599bdab77ad574016e3a7c31c5ca968b8a2daac827a37f269eb26e143e5fe99
perfact::mpa Reflected Cross Site Scripting
Posted Mar 1, 2016
Authored by Matthias Deeg, Sven Freund | Site syss.de

SySS GmbH found out that the request new user and translation functionalities of the web application perfact::mpa are prone to reflected cross-site scripting attacks.

tags | exploit, web, xss
SHA-256 | c41cae5aadb2813a38940d61e582bbde74c6eac30c32083652ec5ccf789a03e0
OpenCms 9.5.2 Cross Site Scripting
Posted Feb 23, 2016
Authored by Rainer Boie | Site syss.de

OpenCms version 9.5.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 90836f4c2cffaaf16a53502663f30a5c82ff5d7140b8933a573d1c03a30e34a1
Thru Managed File Transfer Portal 9.0.2 Insecure Direct Object Reference
Posted Feb 22, 2016
Authored by Dr. Erlijn van Genuchten | Site syss.de

Thru Managed File Transfer Portal version 9.0.2 suffers from an insecure direct object reference vulnerability in the contacts list functionality.

tags | exploit
SHA-256 | 04bf2eec97770c7bbdcc28f9522714c4b0542d404957116ca9741cfcd118f04a
Thru Managed File Transfer Portal 9.0.2 Insecure Direct Object Reference
Posted Feb 22, 2016
Authored by Dr. Erlijn van Genuchten | Site syss.de

Thru Managed File Transfer Portal version 9.0.2 suffers from an insecure direct object reference vulnerability in the upload functionality.

tags | exploit
SHA-256 | f0fc879814ce1f79dd42f81a3bfde9648a14d4d21f9c544a934eff7660ae4c39
Thru Managed File Transfer Portal 9.0.2 Missing Security Check
Posted Feb 22, 2016
Authored by Dr. Erlijn van Genuchten | Site syss.de

The Thru Managed File Transfer application version 9.0.2 allows both unauthenticated and authenticated users to upload files, including viruses.

tags | advisory
SHA-256 | 178fc60f24aa280af3d976a9ac3ef913d89f1c7872bc906e522d80c60a97306b
Thru Managed File Transfer Portal 9.0.2 Insecure Direct Object Reference
Posted Feb 21, 2016
Authored by Dr. Erlijn van Genuchten | Site syss.de

Thru Managed File Transfer Portal version 9.0.2 suffers from an insecure direct object reference vulnerability that references log data.

tags | exploit
SHA-256 | 2147fd1a7ff3b5ec34b6336e5ee66f68da4bfc155effb2b3a760db009af938d9
Novell Filr 1.2.0 Build 846 Cross Site Scripting
Posted Feb 20, 2016
Authored by Dr. Erlijn van Genuchten | Site syss.de

Novell Filr version 1.2.0 build 846 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 86b28f39cecdb7be563acb8a2f24c7e992a2c156cabd954c2ee3d4d4d3b8da2d
Thru Managed File Transfer Portal 9.0.2 SQL Injection
Posted Feb 19, 2016
Authored by Dr. Erlijn van Genuchten, Danny Osterreicher | Site syss.de

Thru Managed File Transfer Portal version 9.0.2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e5c2bd00a93ce0b886ab5d27c5ecc5d879763a1889a4729da8faf34af093fd77
Thru Managed File Transfer Portal 9.0.2 Cross Site Scripting
Posted Feb 19, 2016
Authored by Dr. Erlijn van Genuchten | Site syss.de

Thru Managed File Transfer Portal version 9.0.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | e0c6c0e9ba1dfbb79a77ae2d57381ec098b0846532313373f1f0ef0c0886b5c6
ownCloud 8.2.1 / 8.1.4 / 8.0.9 Information Exposure
Posted Jan 7, 2016
Authored by Dr. Erlijn van Genuchten | Site syss.de

ownCloud versions 8.2.1 and below, 8.1.4 and below, and 8.0.9 and below suffer from an information exposure vulnerability via directory listings.

tags | exploit
advisories | CVE-2016-1499
SHA-256 | 2a03e49b47f5b92a36e0f7c8b25d095b6e9255abca3e8fe34b1f15409b04a89c
sysPass 1.1.2.23 Cross Site Scripting
Posted Dec 8, 2015
Authored by Daniele Salaris | Site syss.de

sysPass versions 1.1.2.23 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | fccd3f6bd7b3f2d36da082f59aaa70d871cc6f8aa84ce409fb7f5e31656b9346
sysPass 1.0.9 Insecure Direct Object Reference
Posted Dec 7, 2015
Authored by Daniele Salaris | Site syss.de

sysPass versions 1.0.9 and below allow for system backups to be downloaded by an external attacker.

tags | exploit
SHA-256 | 3f4f1197fb6b356561f3a5d4c13b670af0b0739a649d539b75953ebc8ae7b8d5
Wirecard Checkout Page 1.0 Price Manipulation
Posted Nov 15, 2015
Authored by Martin Sturm | Site syss.de

An improper validation check in Wirecard Checkout Page version 1.0 allows for price manipulation.

tags | exploit
SHA-256 | 4ffd92860793ff45edfbcf60723efee162f13fe3376e2ff564acfa3643017ba4
Password Safe And Repository Enterprise 7.4.4 Build 2247 SQL Injection
Posted Oct 12, 2015
Authored by Matthias Deeg | Site syss.de

Password Safe and Repository Enterprise version 7.4.4 Build 2247 suffers from remote SQL injection and authentication bypass vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 912329f72ad8b3fa3e4c5025c1548e060893d43692df38044806d8bed8cc8a2b
Password Safe And Repository Enterprise 7.4.4 Build 2247 Crypto Issues
Posted Oct 12, 2015
Authored by Matthias Deeg | Site syss.de

Password Safe and Repository Enterprise version 7.4.4 Build 2247 suffers from insufficiently protecting credentials by using an unsalted MD5 hash for protection.

tags | exploit
SHA-256 | aa3f253285227ed11f229a3e22241cb871c5accd91980275c406e839bee0740f
Secure MFT Cross Site Request Forgery
Posted Oct 4, 2015
Authored by Dr. Adrian Vollmer | Site syss.de

Secure MFT versions 2013 R3, 2014 R1/R2, and 2015 R1 suffer from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 7b7b950f13f6e8a3166c6357b150cb9a151e2570df70f27a19579dd07eb18a21
Kaspersky Small Office Security 13.0.4.233 Authentication Bypass
Posted Oct 1, 2015
Authored by Matthias Deeg, Sven Freund | Site syss.de

By analyzing the password-based authentication for unloading the Kaspersky Small Office Security protection, the SySS GmbH found out, that the password comparison is done within the process avp.exe (actually within the module avpmain.dll), which runs or can be run in the context of the current Windows user, who can also be a standard, limited user. This fact allows a further analysis and the manipulation of the password comparison during runtime without administrative privileges, as every user is able to debug and manipulate the processes running with her user privileges. In order to bypass the password-based authentication to deactivate the protection of Kaspersky Small Office Security in an unauthorized manner, an attacker only has to patch this password comparison, so that it always returns true, for example by comparing the correct unload password with itself or by modifying the program control flow.

tags | advisory
systems | windows
SHA-256 | f56f7f4ad60158ad733a4f73ea4635638de505c45f25ef6e8047b7a8a8e5a7ce
Kaspersky Endpoint Security For Windows 8.1.0.1042 / 10.2.1.23 Unsalted Hash
Posted Oct 1, 2015
Authored by Matthias Deeg, Sven Freund | Site syss.de

The SySS GmbH found out that the admin password for protecting different functions of the Kaspersky Endpoint Security software, like managing backups or stopping protection services, is stored as raw, unsalted MD5 hash value in the Windows registry.

tags | exploit, registry
systems | windows
SHA-256 | 8a7c74b5cbb75ec15cb0f9a3938c69c29a10c97069f7ba7e4871500310fbc21c
Kaspersky Endpoint Security For Windows 8.1.0.1042 / 10.2.1.23 Authentication Bypass
Posted Oct 1, 2015
Authored by Matthias Deeg, Sven Freund | Site syss.de

By analyzing the password-based authentication for unloading the Kaspersky Endpoint Security for Windows protection, the SySS GmbH found out, that the password comparison is done within the process avp.exe, which runs or can be run in the context of the current Windows user, who can also be a standard, limited user. This fact allows a further analysis and the manipulation of the password comparison during runtime without administrative privileges, as every user is able to debug and manipulate the processes running with her user privileges. In order to bypass the password-based authentication to deactivate the protection of Kaspersky Endpoint Security for Windows in an unauthorized manner, an attacker only has to patch this password comparison, so that it always returns true, for example by comparing the correct unload password with itself or by modifying the program control flow.

tags | advisory
systems | windows
SHA-256 | 2d0462fc09a2607d7ee16b44834d6ec901e61cace833e168b9102654473f32bc
Page 2 of 4
Back1234Next

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    13 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close