me

SolarWinds MSP PME Cache Service Insecure File Permissions / Code Execution

SolarWinds MSP PME Cache Service versions prior to 1.1.15 suffer from insecure file permission and code execution vulnerabilities.










me

Windows Mobile 6.5 MessageBox Shellcode

Windows Mobile version 6.5 TR (WinCE 5.2) MessageBox shellcode for ARM.




me

ACDSee FotoSlate PLP File id Parameter Overflow

This Metasploit module exploits a buffer overflow in ACDSee FotoSlate 4.0 Build 146 via a specially crafted id parameter in a String element. When viewing a malicious PLP file with the ACDSee FotoSlate product, a remote attacker could overflow a buffer and execute arbitrary code. This exploit has been tested on systems such as Windows XP SP3, Windows Vista, and Windows 7.




me

NTR ActiveX Control Check() Method Buffer Overflow

This Metasploit module exploits a vulnerability found in NTR ActiveX 1.1.8. The vulnerability exists in the Check() method, due to the insecure usage of strcat to build a URL using the bstrParams parameter contents, which leads to code execution under the context of the user visiting a malicious web page. In order to bypass DEP and ASLR on Windows Vista and Windows 7 JRE 6 is needed.




me

Meterpreter Swaparoo Windows Backdoor Method

Swaparoo - Windows backdoor method for Windows Vista/7/8. This code sneaks a backdoor command shell in place of Sticky Keys prompt or Utilman assistant at login screen.




me

MS13-005 HWND_BROADCAST Low to Medium Integrity Privilege Escalation

The Windows kernel does not properly isolate broadcast messages from low integrity applications from medium or high integrity applications. This allows commands to be broadcasted to an open medium or high integrity command prompts allowing escalation of privileges. We can spawn a medium integrity command prompt, after spawning a low integrity command prompt, by using the Win+Shift+# combination to specify the position of the command prompt on the taskbar. We can then broadcast our command and hope that the user is away and doesn't corrupt it by interacting with the UI. Broadcast issue affects versions Windows Vista, 7, 8, Server 2008, Server 2008 R2, Server 2012, RT. But Spawning a command prompt with the shortcut key does not work in Vista so you will have to check if the user is already running a command prompt and set SPAWN_PROMPT false. The WEB technique will execute a powershell encoded payload from a Web location. The FILE technique will drop an executable to the file system, set it to medium integrity and execute it. The TYPE technique will attempt to execute a powershell encoded payload directly from the command line but it may take some time to complete.




me

.NET Framework 4.6 DLL Hijacking

A DLL side loading vulnerability was found in the .NET Framework version 4.6 when running on Windows Vista or Windows 7. This issue can be exploited by luring a victim into opening an Office document from the attacker's share. An attacker can use this issue to execute arbitrary code with the privileges of the target user. This can potentially result in the attacker taking complete control of the affected system. If the WebDAV Mini-Redirector is enabled, it is possible to exploit this issue over the internet. This issue can be exploited even if the Office document is opened in Protected View.















me

GNUnet P2P Framework 0.11.5

GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP (IPv4 and IPv6), TCP (IPv4 and IPv6), HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing.




me

Common Desktop Environment 2.3.1 Buffer Overflow

A buffer overflow in the CheckMonitor() function in the Common Desktop Environment 2.3.1 and earlier and 1.6 and earlier, as distributed with Oracle Solaris 10 1/13 (Update 11) and earlier, allows local users to gain root privileges via a long palette name passed to dtsession in a malicious .Xdefaults file. Note that Oracle Solaris CDE is based on the original CDE 1.x train, which is different from the CDE 2.x codebase that was later open sourced. Most notably, the vulnerable buffer in the Oracle Solaris CDE is stack-based, while in the open source version it is heap-based.




me

Common Desktop Environment 1.6 Local Privilege Escalation

A buffer overflow in the _SanityCheck() function in the Common Desktop Environment version distributed with Oracle Solaris 10 1/13 (Update 11) and earlier allows local users to gain root privileges via a long calendar name or calendar owner passed to sdtcm_convert in a malicious calendar file. The open source version of CDE (based on the CDE 2.x codebase) is not affected, because it does not ship the vulnerable program. Versions 1.6 and below are affected.




me

Common Desktop Environment 2.3.1 / 1.6 libDtSvc Buffer Overflow

A difficult to exploit stack-based buffer overflow in the _DtCreateDtDirs() function in the Common Desktop Environment version distributed with Oracle Solaris 10 1/13 (Update 11) and earlier may allow local users to corrupt memory and potentially execute arbitrary code in order to escalate privileges via a long X11 display name. The vulnerable function is located in the libDtSvc library and can be reached by executing the setuid program dtsession. Versions 2.3.1 and below as well as 1.6 and earlier are affected.




me

BIND Comes Apart Thanks To Ancient Denial Of Service Vuln





me

New Attack On Home Routers Sends Users To Spoofed Sites That Push Malware




me

Macs Framework 1.14f Cross Site Scripting / SQL Injection

Macs Framework version 1.14f suffers from cross site scripting and remote SQL injection vulnerabilities.




me

User Management System 2.0 SQL Injection

User Management System version 2.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.




me

Complaint Management System 4.2 SQL Injection

Complaint Management System version 4.2 suffers a remote SQL injection vulnerability that allows for authentication bypass.




me

Online AgroCulture Farm Management System 1.0 SQL Injection

Online AgroCulture Farm Management System version 1.0 suffers from a remote SQL injection vulnerability.




me

School File Management System 1.0 SQL Injection

School File Management System version 1.0 suffers from a remote SQL injection vulnerability.




me

Car Park Management System 1.0 SQL Injection

Car Park Management System version 1.0 suffers a remote SQL injection vulnerability that allows for authentication bypass.




me

KeePass Simple Dictionary Password Enumerator

This is a simple perl script to perform dictionary attacks against the KeePass password manager.




me

SSH/SSL RSA Private Key Passphrase Dictionary Enumerator

This is a script to perform SSH/SSL RSA private key passphrase enumeration with a dictionary attack.




me

Ecommerce Systempay 1.0 Brute Force

Ecommerce Systempay version 1.0 suffers from a production key brute forcing vulnerability.