what you don't know can hurt you
Showing 1 - 25 of 39 RSS Feed

Files

ABB IDAL HTTP Server Stack-Based Buffer Overflow
Posted Jun 24, 2019
Authored by Eldar Marcussen

The IDAL HTTP server is vulnerable to a stack-based buffer overflow when receiving a large host header in a HTTP request. The host header value overflows a buffer and overwrites the Structured Exception Handler (SEH) address with a larger buffer. An unauthenticated attacker can send a Host header value of 2047 bytes or more to overflow the host headers and overwrite the SEH address which can then be leveraged to execute attacker controlled code on the server.

tags | exploit, web, overflow
advisories | CVE-2019-7232
MD5 | c4d1eb7e747d309f6eb5cd228fd543c9

Related Files

Sony BRAVIA Smart TV Denial Of Service
Posted Jul 8, 2019
Authored by xen1thLabs

Sony BRAVIA Smart TVs suffer from multiple denial of service vulnerabilities.

tags | exploit, denial of service, vulnerability
advisories | CVE-2019-11889, CVE-2019-11890
MD5 | fdd5b168347d3881e7b4c597d34d83cf
ABB IDAL HTTP Server Uncontrolled Format String
Posted Jun 24, 2019
Authored by Eldar Marcussen

The IDAL HTTP server is vulnerable to memory corruption through insecure use of user supplied format strings. An attacker can abuse this functionality to bypass authentication or execute code on the server. The IDAL HTTP server does not safely handle username or cookie strings during the authentication process. Attempting to authenticate with the username "%25s%25p%25x%25n" will crash the server. Sending "%08x.AAAA.%08x.%08x" will log memory content from the stack.

tags | exploit, web
advisories | CVE-2019-7228
MD5 | c1e2be691a3acf789ade041e7211593f
ABB IDAL HTTP Server Authentication Bypass
Posted Jun 21, 2019
Authored by Eldar Marcussen

The IDAL HTTP server CGI interface contains a URL, which allows an unauthenticated attacker to bypass authentication and gain access to privileged functions. In the IDAL CGI interface, there is a URL (/cgi/loginDefaultUser), which will create a session in an authenticated state and return the session ID along with the username and plaintext password of the user. An attacker can then login with the provided credentials or supply the string 'IDALToken=......' in a cookie which will allow them to perform privileged operations such as restarting the service with /cgi/restart.

tags | exploit, web, cgi
advisories | CVE-2019-7226
MD5 | 859c2710995c4452403cd17e5573e137
ABB HMI Missing Signature Verification
Posted Jun 21, 2019
Authored by xen1thLabs

ABB HMI fails to perform any signature validation checking during two different transmission methods for upgrade.

tags | exploit
advisories | CVE-2019-7229
MD5 | 59295bf0d6d95d0017ac5f04c838e376
ABB IDAL FTP Server Uncontrolled Format String
Posted Jun 21, 2019
Authored by Eldar Marcussen

The IDAL FTP server is vulnerable to memory corruption through insecure use of user supplied format strings. An attacker can abuse this functionality to bypass authentication or execute code on the server.

tags | exploit
advisories | CVE-2019-7230
MD5 | 904004a3f4b9e76ee3d9da27f7d9a6c9
ABB HMI Hardcoded Credentials
Posted Jun 21, 2019
Authored by xen1thLabs

The affected ABB components implement hidden administrative accounts used during the provisioning phase of the HMI interface. These credentials allow the provisioning tool "Panel Builder 600" to flash a new interface and Tags (MODBUS coils) mapping to the HMI.

tags | advisory
advisories | CVE-2019-7225
MD5 | 22f0c831444ec02904c35895012b0a71
ABB IDAL FTP Server Path Traversal
Posted Jun 21, 2019
Authored by Eldar Marcussen

The IDAL FTP server fails to ensure that directory change requests do not change to locations outside of the FTP servers root directory. An authenticated attacker can simply traverse outside the server root directory by changing the directory with "cd ..". An authenticated attacker can traverse to arbitrary directories on the hard disk and then use the FTP server functionality to download and upload files. An unauthenticated attacker can take advantage of the hardcoded or default credential pair exor/exor to become an authenticated attacker.

tags | exploit, arbitrary, root
advisories | CVE-2019-7227
MD5 | be5338ed28cb9ab9d011d91ec4b3cbcd
ABB HMI Outdated Software Components
Posted Jun 21, 2019
Authored by xen1thLabs

ABB HMI uses outdated software components that are statically linked into the firmware files and service binaries. These components have documented vulnerabilities and should be updated and replaced. It was possible to identify severally outdated OpenSSL (version 0.9.8g) and ABYSS HTTP (version 0.4) server components.

tags | advisory, web, vulnerability
advisories | CVE-2009-3245
MD5 | d9b77c26910ae6df3ac760462ddd0df5
ABB IDAL FTP Server Buffer Overflow
Posted Jun 21, 2019
Authored by Eldar Marcussen

The IDAL FTP server is vulnerable to a buffer overflow where a large string is sent by an authenticated attacker that causes a buffer overflow. This overflow is handled, but terminates the process. An authenticated attacker can send a FTP command string of 472 bytes or more to overflow a buffer causing an exception that terminates the server. An unauthenticated attacker can take advantage of the hardcoded or default credential pair exor/exor to become an authenticated attacker.

tags | exploit, overflow
advisories | CVE-2019-7231
MD5 | fc10a0c030b5fa18e687345426253408
Xlight FTP Server 3.9.1 Buffer Overflow
Posted Feb 25, 2019
Authored by Logan Whitmire

Xlight FTP Server version 3.9.1 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
MD5 | e48ac2cb87a5cd12ca39dd2f8b69d1d2
xls2csv 0.95 Buffer Overflow
Posted May 14, 2018
Authored by nafiez

xls2csv version 0.95 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
MD5 | f750738e8735e0b33c3f768f0151558d
Xlight FTP Server 3.8.8.5 Buffer Overflow
Posted Nov 13, 2017
Authored by bzyo

Xlight FTP Server version 3.8.8.5 buffer overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
MD5 | 04ca2efc16ac86410b0b8ec54d0cf44a
WordPress XCloner 3.1.2 XSS / Command Execution
Posted May 31, 2015
Authored by Larry W. Cashdollar

WordPress XCloner plugin version 3.1.2 suffers from command execution and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2015-4336, CVE-2015-4337, CVE-2015-4338
MD5 | 5d0b053dd77486b7a90024b666ebdc48
Xlrstats 2.0.1 SQL Injection
Posted Oct 15, 2010
Authored by Sky4

Xlrstats versions 2.0.1, 2.0.2 and 2.0.3 suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | c08babb22f1d940b0eb38110b12c74f1
Xlight FTP Server 3.5.5 Directory Traversal
Posted Jul 7, 2010
Site accensussecurity.com

Xlight FTP Server version 3.5.5 suffers from multiple directory traversal vulnerabilities.

tags | exploit, vulnerability, file inclusion
MD5 | e62cd0735f92f719e5ddec8ca11aa994
X-Lite SIP 3 Memory Corruption
Posted Feb 8, 2010
Authored by TecR0c

X-Lite SIP version 3 memory corruption heap overflow exploit that creates a malicious .wav file.

tags | exploit, overflow
MD5 | 192049c6b120ca1fdc5385359ad2c434
XlentCMS 1.0.4 SQL Injection
Posted Jan 4, 2010
Authored by Gamoscu

XlentCMS version 1.0.4 suffers from a remote SQL injection vulnerability in downloads.php.

tags | exploit, remote, php, sql injection
MD5 | 95f68c8466d828fe18e1e44ea624a9a8
Xlink FTP Client Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in Xlink FTP Client 32 Version 3.01 that comes bundled with Omni-NFS Enterprise 5.2. When a overly long FTP server response is received by a client, arbitrary code may be executed.

tags | exploit, overflow, arbitrary
advisories | CVE-2006-5792
MD5 | ab29abeb42a291212c29b62ef4f76b98
Omni-NFS Server Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in Xlink Omni-NFS Server 5.2 When sending a specially crafted nfs packet, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
MD5 | a6ba4f8a3c96c5acb15f84169eccc517
Xlink FTP Server Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in Xlink FTP Server that comes bundled with Omni-NFS Enterprise 5.2. When a overly long FTP request is sent to the server, arbitrary code may be executed.

tags | exploit, overflow, arbitrary
advisories | CVE-2006-5792
MD5 | b289fbc40cf19530e264ad1e543c9ff6
xlcrack-1.2.tar.gz
Posted Mar 4, 2007
Authored by Nick Lamb | Site devel.tlrmx.org

Xlcrack is a small tool to recover lost and forgotten passwords from XLS files. Works on most Un*x systems, but it needs libgsf, most commonly installed along with Gnumeric. Some newer XLS files are not suitable for password recovery using this software - works on Excel 95 and older.

Changes: Added better support for non-ascii characters, fixed bugs and updated homepage.
tags | cracker
MD5 | d682ffeabadfa9066b8680359c670b75
xlatunes-sql.txt
Posted Feb 23, 2007
Authored by Guns

XLAtunes version 0.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | bb4255de0be613cd2b22764ed0120bd9
xlnc-rfi.txt
Posted Feb 8, 2007
Authored by Gokhan

XLNC1 Radio Classical Music Nuke Portal suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
MD5 | bea860d4c80f94cfb5a4687aa76cb0e2
xlpd.txt
Posted Jan 8, 2006
Authored by Dr. Insane

xlpd 2.1 is susceptible to a denial of service condition when receiving too many connections from the same IP address.

tags | advisory, denial of service
MD5 | 557dc2b7f86ce2cb6089ab4d26c5da53
xloadFlaws.tgz
Posted Oct 7, 2005
Authored by Ariel Berkman

Three buffer overflows have been discovered in xloadimage during the handling of the image title name. When xloadimage is processing a loaded image, it is creating a new Image object and then writing the processed image to it. At that point, it will also copy the title from the old image to the newly created image. The 'zoom', 'reduce', and 'rotate' functions are using a fixed length buffer to construct the new title name when an image processing is done. Since the title name in a NIFF format is of varying length, and there are insufficient buffer size validations, the buffer can be overflowed. Proof of concept files included.

tags | exploit, overflow, proof of concept
MD5 | 4ebe115927efb8268af7d4de94c58dc9
Page 1 of 2
Back12Next

File Archive:

February 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    1 Files
  • 2
    Feb 2nd
    2 Files
  • 3
    Feb 3rd
    17 Files
  • 4
    Feb 4th
    15 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    16 Files
  • 7
    Feb 7th
    19 Files
  • 8
    Feb 8th
    1 Files
  • 9
    Feb 9th
    2 Files
  • 10
    Feb 10th
    15 Files
  • 11
    Feb 11th
    20 Files
  • 12
    Feb 12th
    12 Files
  • 13
    Feb 13th
    18 Files
  • 14
    Feb 14th
    17 Files
  • 15
    Feb 15th
    4 Files
  • 16
    Feb 16th
    4 Files
  • 17
    Feb 17th
    34 Files
  • 18
    Feb 18th
    15 Files
  • 19
    Feb 19th
    19 Files
  • 20
    Feb 20th
    20 Files
  • 21
    Feb 21st
    15 Files
  • 22
    Feb 22nd
    2 Files
  • 23
    Feb 23rd
    2 Files
  • 24
    Feb 24th
    16 Files
  • 25
    Feb 25th
    37 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close