exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 63 RSS Feed

Files

FLIX AX8 1.46.16 Remote Command Execution
Posted Aug 19, 2022
Authored by Samy Younsi

FLIR AX8 versions 1.46.16 and below unauthenticated remote OS command injection exploit.

tags | exploit, remote
advisories | CVE-2022-36266
SHA-256 | d69929a972eb08cfeb279707887a6f7dd7e33ba6198b5c583c8af9bc510a1eb7

Related Files

Apache Axis2 Brute Force Utility
Posted Sep 1, 2024
Authored by Leandro Oliveira | Site metasploit.com

This Metasploit module attempts to login to an Apache Axis2 instance using username and password combinations indicated by the USER_FILE, PASS_FILE, and USERPASS_FILE options. It has been verified to work on at least versions 1.4.1 and 1.6.2.

tags | exploit
advisories | CVE-2010-0219
SHA-256 | 4719452255874c71f8d0b9c9d1065c938d1a02c4240afad5a85654a333b0db20
Apache Axis2 1.4.1 Local File Inclusion
Posted Sep 1, 2024
Authored by Tiago Ferreira | Site metasploit.com

This Metasploit module exploits an Apache Axis2 v1.4.1 local file inclusion (LFI) vulnerability. By loading a local XML file which contains a cleartext username and password, attackers can trivially recover authentication credentials to Axis services.

tags | exploit, local, file inclusion
SHA-256 | 50104ff91cd322fe465188779cfaa98819e42e8898505fa53d0efc5a47d67e68
Axigen Arbitrary File Read And Delete
Posted Aug 31, 2024
Authored by juan vazquez, Zhao Liang | Site metasploit.com

This Metasploit module exploits a directory traversal vulnerability in the WebAdmin interface of Axigen, which allows an authenticated user to read and delete arbitrary files with SYSTEM privileges. The vulnerability is known to work on Windows platforms. This Metasploit module has been tested successfully on Axigen 8.10 over Windows 2003 SP2.

tags | exploit, arbitrary
systems | windows
advisories | CVE-2012-4940
SHA-256 | 65bded7c1002f50c11a1863f2988834a0950e01d4adc9009e4ce5c5edaea371a
Axigen 10.5.0–4370c946 Cross Site Scripting
Posted Sep 8, 2023
Authored by AmirZargham

Axigen versions 10.5.0–4370c946 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2022-31470
SHA-256 | fe2b4328c2557a11918de6f341b200a07afaf0512f0b5909133817cf704b934b
FLIR AX8 1.46.16 Remote Command Injection
Posted Nov 2, 2022
Authored by Samy Younsi, Thomas Knudsen, h00die-gr3y | Site metasploit.com

All FLIR AX8 thermal sensor cameras versions up to and including 1.46.16 are vulnerable to remote command injection. This can be exploited to inject and execute arbitrary shell commands as the root user through the id HTTP POST parameter in the res.php endpoint. This module uses the vulnerability to upload and execute payloads gaining root privileges.

tags | exploit, remote, web, arbitrary, shell, root, php
advisories | CVE-2022-37061
SHA-256 | a321cd3e8960e684cbab1cd82bb0f9be0cda474af87c57e7f89fa9aaa83b6bca
FLIR AX8 1.46.16 Traversal / Access Control / Command Injection / XSS
Posted Aug 19, 2022
Authored by Samy Younsi, Thomas Knudsen

FLIR AX8 versions 1.46.16 and below suffer from command injection, directory traversal, improper access control, and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, file inclusion
advisories | CVE-2022-37060, CVE-2022-37061, CVE-2022-37062, CVE-2022-37063
SHA-256 | d4b0fa3d39bb7d9eb67520d399557821deb5682ab4e0f91e473b5af510fec4d7
Linux ax88179_rx_fixup() Out-Of-Bounds Access
Posted Mar 21, 2022
Authored by Jann Horn, Google Security Research

In Linux, drivers/net/usb/ax88179_178a.c contains multiple out-of-bounds accesses in ax88179_rx_fixup(), the function responsible for taking a buffer received over USB and splitting it up into ethernet packets.

tags | advisory
systems | linux
SHA-256 | d31f6a101db6dc5fd85ff3bf16404acb26c0969c2cd57cc1adc10f3d4419cf21
Axis IP Camera Shell Upload
Posted Feb 28, 2022
Authored by jbaines-r7 | Site metasploit.com

This Metasploit module exploits the "Apps" feature in Axis IP cameras. The feature allows third party developers to upload and execute eap applications on the device. The system does not validate the application comes from a trusted source, so a malicious attacker can upload and execute arbitrary code. The issue has no CVE, although the technique was made public in 2018. This module uploads and executes stageless meterpreter as root. Uploading the application requires valid credentials. The default administrator credentials used to be root:root but newer firmware versions force users to provide a new password for the root user. The module was tested on an Axis M3044-V using the latest firmware (9.80.3.8: December 2021). All modules that support the "Apps" feature are presumed to be vulnerable.

tags | exploit, arbitrary, root
SHA-256 | 3b946c3c32ffbe1237309479a6f3fbc02ff1259e17c42ed2ee33315e97a2b97e
axTLS 2.1.5 Denial Of Service
Posted Nov 29, 2019
Authored by Robert Horr

Multiple denial of service vulnerabilities have been discovered and disclosed in the axTLS library versions 2.1.5 and below.

tags | advisory, denial of service, vulnerability
advisories | CVE-2019-10013, CVE-2019-9689
SHA-256 | 4b795ed8fab6f7bf3baf0d923f7583ab93caeae5946f05ef62eac4fd030fc492
Axway SecureTransport 5 XML Injection
Posted Jul 23, 2019
Authored by Dominik Penner

Axway SecureTransport 5 suffers from an unauthenticated XML external entity injection vulnerability.

tags | exploit
SHA-256 | 7ae144683e44ae643e28c83da54fe27287daee7e50a92c55a6932e7a99323e09
Axessh 4.2 Denial Of Service
Posted May 16, 2019
Authored by Victor Mondragon

Axessh version 4.2 denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
SHA-256 | 5ac2fd6ab32034cb62ce26d355ed5fd743d956eb9f257f77fad9ec445308ce30
Axioscloud Sissiweb Registro Elettronico 7.0.0 Cross Site Scripting
Posted Oct 24, 2018
Authored by Dino Barlattani

Axioscloud Sissiweb Registro Elettronico version 7.0.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2018-18437
SHA-256 | 3c10863d0e2abd4f243f81f66ecbdb173b4bda14b1de618998cf91e3b4670490
FLIR Systems FLIR AX8 Thermal Camera 1.32.16 Hard-coded Credentials Shell Access
Posted Oct 15, 2018
Authored by LiquidWorm | Site zeroscience.mk

FLIR AX8 thermal sensor camera devices version 1.32.16 utilize hard-coded credentials within its Linux distribution image. These sets of credentials (SSH) are never exposed to the end-user and cannot be changed through any normal operation of the camera. Attacker could exploit this vulnerability by logging in using the default credentials for the web panel or gain shell access.

tags | exploit, web, shell
systems | linux
SHA-256 | 0de614831d3b207ecfaf1e3fe077655b58680dacd90d072ca20b3ad2ade27b23
FLIR Systems FLIR AX8 Thermal Camera 1.32.16 Arbitrary File Disclosure
Posted Oct 15, 2018
Authored by LiquidWorm | Site zeroscience.mk

The FLIR AX8 thermal sensor camera version 1.32.16 suffers from an unauthenticated arbitrary file disclosure vulnerability. Input passed via the 'file' parameter in download.php is not properly verified before being used to download config files. This can be exploited to disclose the contents of arbitrary files via absolute path.

tags | exploit, arbitrary, php
SHA-256 | 4910689d53033b4139e7b3d0f8b92bc214a9cc6782213c8e4ee94d74eae57221
FLIR Systems FLIR AX8 Thermal Camera 1.32.16 RTSP Stream Disclosure
Posted Oct 15, 2018
Authored by LiquidWorm | Site zeroscience.mk

The FLIR AX8 thermal sensor camera version 1.32.16 suffers an unauthenticated and unauthorized live RTSP video stream access.

tags | exploit
SHA-256 | ae1464855d3b12a1fe0dc5269d50e29d905cd74a8815b4317e3f235a057d14ce
FLIR Systems FLIR AX8 Thermal Camera 1.32.16 Remote Root
Posted Oct 15, 2018
Authored by LiquidWorm | Site zeroscience.mk

The FLIR AX8 thermal sensor camera version 1.32.16 suffers from two unauthenticated command injection vulnerabilities. The issues can be triggered when calling multiple unsanitized HTTP GET/POST parameters within the shell_exec function in res.php and palette.php file. This can be exploited to inject arbitrary system commands and gain root remote code execution.

tags | exploit, remote, web, arbitrary, root, php, vulnerability, code execution
SHA-256 | 99f659cdf3c32886f1df88cb3b5df0af997dddb9fedfd50e3d11a4fe93ff269c
Axis Network Camera Remote Command Execution
Posted Jul 26, 2018
Authored by sinn3r, Chris Lee, wvu, Matthew Kienow, Or Peles, Jacob Robles, Shelby Pace, Cale Black, Brent Cook | Site metasploit.com

This Metasploit module exploits an authentication bypass in .srv functionality and a command injection in parhand to execute code as the root user.

tags | exploit, root
advisories | CVE-2018-10660, CVE-2018-10661, CVE-2018-10662
SHA-256 | c10f9b22f833b812b5b5320ea587dedf77fe8a60a4a58ddec5548a2ea5fb202d
Axis Cameras Authorization Bypass / Unrestricted Access / Command Injection
Posted Jul 2, 2018
Authored by Or Peles | Site blog.vdoo.com

Axis Cameras suffer from authorization bypass, unrestricted dbus access, command injection, denial of service, and information disclosure vulnerabilities.

tags | exploit, denial of service, vulnerability, info disclosure
advisories | CVE-2018-10658, CVE-2018-10659, CVE-2018-10660, CVE-2018-10661, CVE-2018-10662, CVE-2018-10663, CVE-2018-10664
SHA-256 | 5e9747cd700a38abddaca3fd3d40d3df83bf20b08c4efc814e47b25f3307c9bf
AXON PBX 2.02 Cross Site Scripting
Posted May 31, 2018
Authored by Himanshu Mehta

AXON PBX version 2.02 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2018-11552
SHA-256 | 04a666c41333b5f3a6da50e9ea1dbdebeff05424793da848b007b56096f2c465
AXON PBX 2.02 DLL Hijacking
Posted May 31, 2018
Authored by Himanshu Mehta

AXON PBX version 2.02 suffers from a DLL hijacking vulnerability.

tags | exploit
systems | windows
advisories | CVE-2018-11551
SHA-256 | c680c40bb9644184c45d660a62e2391edc86949192449483678e312f79d2cc46
AxxonSoft Axxon Next Directory Traversal
Posted Feb 28, 2018
Authored by Martin A Cicalla Jr

AxxonSoft Axxon Next suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2018-7467
SHA-256 | d35bb1a5d3f761c3ff0d4cfa73dd81a7c335da6fabac0fea007e4f5814a538e4
Axis Communications MPQT/PACS Heap Overflow / Information Leakage
Posted Dec 1, 2017
Authored by bashis

Axis Communications MPQT/PACS suffers from heap overflow and information leakage vulnerabilities.

tags | exploit, overflow, vulnerability
SHA-256 | 5c70ff5167b04f198b52c0dc3f8309937d69063f123eca02784c45bea1eb2e02
Axis 2100 Network Camera 2.43 Cross Site Scripting
Posted Aug 4, 2017
Authored by Nassim Asrir

Axis 2100 Network Camera version 2.43 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2017-12413
SHA-256 | 6571f063cbf73cf8a5e656fbd96dcc33bef106f5cb93d24594de81a58522eba7
AXIS Cross Site Request Forgery / Cross Site Scripting
Posted Mar 16, 2017
Authored by David Wearing

Various AXIS cameras suffer from cross site request forgery and cross site scripting vulnerabilities amongst other issues.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 365490dde209cafe4c70f755efc7843b6e66b7ba8c535e04e832ae9478ce59c6
Android max86902 Driver Race Condition
Posted Jan 5, 2017
Authored by Google Security Research, laginimaineb

Android suffers from a race condition in the max86902 driver sysfs interfaces.

tags | exploit
SHA-256 | e9f80a6e96632a7efbeb45128bbf886bfd54a33da227b3ccd75a5a8ac9b3d50f
Page 1 of 3
Back123Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    0 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close