what you don't know can hurt you
Showing 1 - 25 of 100 RSS Feed

Files

Qiata FTA 1.70.19 Cross Site Scripting
Posted Sep 30, 2020
Authored by Patrick Hener

Qiata FTA versions 1.70.19 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2020-14294
MD5 | 9660a543c1a650f4817bd72334174dad

Related Files

OpenExif 2.1.4 Denial Of Service
Posted Jul 30, 2017
Authored by qflb.wu

The ExifJpegHUFFTable::deriveTable function in src/ExifHuffmanTable.cpp in OpenExif version 2.1.4 can cause a denial of service (heap buffer overflow and application crash) via a crafted jpg file.

tags | exploit, denial of service, overflow
MD5 | b2e464c621fd9a9a311ec5091118e084
Google Chrome Accessibility blink::Node Corruption
Posted Nov 29, 2016
Authored by SkyLined

A specially crafted web-page can trigger an unknown memory corruption vulnerability in Google Chrome Accessibility code. An attacker can cause code to attempt to execute a method of an object using a vftable, when the pointer to that object is not valid, or the object is not of the expected type. Successful exploitation can lead to arbitrary code execution.

tags | exploit, web, arbitrary, code execution
MD5 | ab98628c1095fe66451caf0ac7387408
Microsoft Internet Explorer MSHTML DOMImplementation Type Confusion
Posted Nov 28, 2016
Authored by SkyLined

A specially crafted web-page can cause a type confusion vulnerability in Microsoft Internet Explorer 8 through to 11. An attacker can cause code to be executed with a stack layout it does not expect, or have code attempt to execute a method of an object using a vftable, when that object does not have a vftable. Successful exploitation can lead to arbitrary code execution.

tags | exploit, web, arbitrary, code execution
advisories | CVE-2016-0063
MD5 | a39c2c649d0580dbcfd87e206179520a
Thru Managed File Transfer Portal 9.0.2 Insecure Direct Object Reference
Posted Feb 22, 2016
Authored by Dr. Erlijn van Genuchten

Thru Managed File Transfer Portal version 9.0.2 suffers from an insecure direct object reference vulnerability in the contacts list functionality.

tags | exploit
MD5 | 0359c7bcfb5f26ae08d45bc52e2355cd
Thru Managed File Transfer Portal 9.0.2 Insecure Direct Object Reference
Posted Feb 22, 2016
Authored by Dr. Erlijn van Genuchten

Thru Managed File Transfer Portal version 9.0.2 suffers from an insecure direct object reference vulnerability in the upload functionality.

tags | exploit
MD5 | ea88f860f37fc2b253ba3d845334f5aa
Thru Managed File Transfer Portal 9.0.2 Missing Security Check
Posted Feb 22, 2016
Authored by Dr. Erlijn van Genuchten

The Thru Managed File Transfer application version 9.0.2 allows both unauthenticated and authenticated users to upload files, including viruses.

tags | advisory
MD5 | 55196aa26e56539d6b47d39345b7787f
Thru Managed File Transfer Portal 9.0.2 Insecure Direct Object Reference
Posted Feb 21, 2016
Authored by Dr. Erlijn van Genuchten

Thru Managed File Transfer Portal version 9.0.2 suffers from an insecure direct object reference vulnerability that references log data.

tags | exploit
MD5 | bc56eb31678d93bcb8394c96c9d975a8
Thru Managed File Transfer Portal 9.0.2 SQL Injection
Posted Feb 19, 2016
Authored by Dr. Erlijn van Genuchten, Danny Osterreicher

Thru Managed File Transfer Portal version 9.0.2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 2f791a5b5d4e464216f6ba87f0867421
Thru Managed File Transfer Portal 9.0.2 Cross Site Scripting
Posted Feb 19, 2016
Authored by Dr. Erlijn van Genuchten

Thru Managed File Transfer Portal version 9.0.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 6590858b7c282243a36ae678a0d2db8c
ownCloud 8.2.1 / 8.1.4 / 8.0.9 Information Exposure
Posted Jan 7, 2016
Authored by Dr. Erlijn van Genuchten

ownCloud versions 8.2.1 and below, 8.1.4 and below, and 8.0.9 and below suffer from an information exposure vulnerability via directory listings.

tags | exploit
advisories | CVE-2016-1499
MD5 | cb1d5a61671252d127d71dc1fa78ef09
Samsung SoftAP Weak Password
Posted Dec 18, 2015
Authored by Augusto Pereyra

Samsung's SoftAP WPA2-PSK password generation is weak and can be cracked in a few hours.

tags | advisory
advisories | CVE-2015-5729
MD5 | 8e6e1e6a07c89099c66cad01237c00ea
sysPass 1.1.2.23 Cross Site Scripting
Posted Dec 8, 2015
Authored by Daniele Salaris

sysPass versions 1.1.2.23 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 6488692414f2d6f4dda79af710325b6e
sysPass 1.0.9 Insecure Direct Object Reference
Posted Dec 7, 2015
Authored by Daniele Salaris

sysPass versions 1.0.9 and below allow for system backups to be downloaded by an external attacker.

tags | exploit
MD5 | 89a34a3f967152453ce2bbb6c4aa70b2
Wirecard Checkout Page 1.0 Price Manipulation
Posted Nov 15, 2015
Authored by Martin Sturm

An improper validation check in Wirecard Checkout Page version 1.0 allows for price manipulation.

tags | exploit
MD5 | 2101880cb1d104eccf3ee32fc8fff5dc
Password Safe And Repository Enterprise 7.4.4 Build 2247 SQL Injection
Posted Oct 12, 2015
Authored by Matthias Deeg

Password Safe and Repository Enterprise version 7.4.4 Build 2247 suffers from remote SQL injection and authentication bypass vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
MD5 | 77aae58b99fd15bdec504d12ec886541
Password Safe And Repository Enterprise 7.4.4 Build 2247 Crypto Issues
Posted Oct 12, 2015
Authored by Matthias Deeg

Password Safe and Repository Enterprise version 7.4.4 Build 2247 suffers from insufficiently protecting credentials by using an unsalted MD5 hash for protection.

tags | exploit
MD5 | a1dd41cdf5b9afaf6e8d2c78c23f392b
Secure MFT Cross Site Request Forgery
Posted Oct 4, 2015
Authored by Dr. Adrian Vollmer

Secure MFT versions 2013 R3, 2014 R1/R2, and 2015 R1 suffer from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | d560b8b7db47f893532dfb0e64a55bf4
Kaspersky Small Office Security 13.0.4.233 Authentication Bypass
Posted Oct 1, 2015
Authored by Matthias Deeg, Sven Freund

By analyzing the password-based authentication for unloading the Kaspersky Small Office Security protection, the SySS GmbH found out, that the password comparison is done within the process avp.exe (actually within the module avpmain.dll), which runs or can be run in the context of the current Windows user, who can also be a standard, limited user. This fact allows a further analysis and the manipulation of the password comparison during runtime without administrative privileges, as every user is able to debug and manipulate the processes running with her user privileges. In order to bypass the password-based authentication to deactivate the protection of Kaspersky Small Office Security in an unauthorized manner, an attacker only has to patch this password comparison, so that it always returns true, for example by comparing the correct unload password with itself or by modifying the program control flow.

tags | advisory
systems | windows
MD5 | 5e46fdc705611011780a067f3a7e2b49
Kaspersky Endpoint Security For Windows 8.1.0.1042 / 10.2.1.23 Unsalted Hash
Posted Oct 1, 2015
Authored by Matthias Deeg, Sven Freund

The SySS GmbH found out that the admin password for protecting different functions of the Kaspersky Endpoint Security software, like managing backups or stopping protection services, is stored as raw, unsalted MD5 hash value in the Windows registry.

tags | exploit, registry
systems | windows
MD5 | 046ea318b27a89b15f537db5a397f8e5
Kaspersky Endpoint Security For Windows 8.1.0.1042 / 10.2.1.23 Authentication Bypass
Posted Oct 1, 2015
Authored by Matthias Deeg, Sven Freund

By analyzing the password-based authentication for unloading the Kaspersky Endpoint Security for Windows protection, the SySS GmbH found out, that the password comparison is done within the process avp.exe, which runs or can be run in the context of the current Windows user, who can also be a standard, limited user. This fact allows a further analysis and the manipulation of the password comparison during runtime without administrative privileges, as every user is able to debug and manipulate the processes running with her user privileges. In order to bypass the password-based authentication to deactivate the protection of Kaspersky Endpoint Security for Windows in an unauthorized manner, an attacker only has to patch this password comparison, so that it always returns true, for example by comparing the correct unload password with itself or by modifying the program control flow.

tags | advisory
systems | windows
MD5 | 1086f747be3eb0c4c2fe2cf3b6779064
Kaspersky Anti-Virus 15.0.1.415 Unsalted Hash
Posted Oct 1, 2015
Authored by Matthias Deeg, Sven Freund

The SySS GmbH found out that the administrator password for protecting different functions of the Kaspersky Anti-Virus software, like managing backups or stopping protection services, is stored as raw, unsalted MD5 hash value in the Windows registry.

tags | exploit, registry, virus
systems | windows
MD5 | 369760ef08cc2b83d83527f99b2c5299
Kaspersky Anti-Virus 15.0.1.415 Authentication Bypass
Posted Oct 1, 2015
Authored by Matthias Deeg, Sven Freund

By analyzing the password-based authentication for unloading the Kaspersky Anti-Virus protection, the SySS GmbH found out, that the password comparison is done within the process avp.exe (actually within the used module shell_service.dll), which runs or can be run in the context of the current Windows user, who can also be a standard, limited user. This fact allows a further analysis and the manipulation of the password comparison during runtime without administrative privileges, as every user is able to debug and manipulate the processes running with her user privileges. In order to bypass the password-based authentication to deactivate the protection of Kaspersky Anti-Virus in an unauthorized manner, an attacker only has to patch this password comparison, so that it always returns true, for example by comparing the correct unload password with itself or by modifying the program control flow.

tags | advisory, virus
systems | windows
MD5 | dbe91bf95bd0bc4235598ff893194b09
Kaspersky Internet Security 15.0.2.361 Unsalted Hash
Posted Oct 1, 2015
Authored by Matthias Deeg, Sven Freund

The SySS GmbH found out that the administrator password for protecting different functions of the Kaspersky Internet Security software, like managing backups or stopping protection services, is stored as raw, unsalted MD5 hash value in the Windows registry.

tags | exploit, registry
systems | windows
MD5 | f880e334aba51f05b55d115bc9c61d3b
Kaspersky Internet Security 15.0.2.361 Authentication Bypass
Posted Oct 1, 2015
Authored by Matthias Deeg, Sven Freund

By analyzing the password-based authentication for unloading the Kaspersky Internet Security protection, the SySS GmbH found out, that the password comparison is done within the process avp.exe (actually within the used module shell_service.dll), which runs or can be run in the context of the current Windows user, who can also be a standard, limited user. This fact allows a further analysis and the manipulation of the password comparison during runtime without administrative privileges, as every user is able to debug and manipulate the processes running with her user privileges. In order to bypass the password-based authentication to deactivate the protection of Kaspersky Internet Security in an unauthorized manner, an attacker only has to patch this password comparison, so that it always returns true, for example by comparing the correct unload password with itself or by modifying the program control flow.

tags | advisory
systems | windows
MD5 | 83058e3c88e6bdcf0882c306620e66bd
Kaspersky Total Security 15.0.1.415 Unsalted Hash
Posted Oct 1, 2015
Authored by Matthias Deeg, Sven Freund

The SySS GmbH found out that the administrator password for protecting different functions of the Kaspersky Total Security software, like managing backups or stopping protection services, is stored as raw, unsalted MD5 hash value in the Windows registry.

tags | exploit, registry
systems | windows
MD5 | 30409400e9eb6a41ab0a7c7c0c4323c2
Page 1 of 4
Back1234Next

File Archive:

December 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    22 Files
  • 2
    Dec 2nd
    33 Files
  • 3
    Dec 3rd
    16 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close