Subscribe via feed.
Archive for July, 2016

TeamPass Passwords Management System 2.1.26 File Download

Posted by deepcore under exploit (No Respond)

TeamPass Passwords Management System versions 2.1.26 and below suffer from an unauthenticated arbitrary file download vulnerability.

Rapid7 AppSpider 6.12 Privilege Escalation

Posted by deepcore under exploit (No Respond)

Rapid7 AppSpider version 6.12 web application vulnerability scanner suffers from an unquoted search path issue impacting the services ‘AppSpider REST Server’, ‘AppSpider REST Service’ and ‘AppSpiderUpgradeService’ for Windows deployed as part of AppSpider solution. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system. A […]

Barracuda Spam And Virus Firewall 5.1.3.007 Remote Root

Posted by deepcore under exploit (No Respond)

This Metasploit module exploits a remote command execution vulnerability in the Barracuda Spam and Virus firewall firmware versions 5.1.3.007 and below by exploiting a vulnerability in the web administration interface. By sending a specially crafted request it’s possible to inject system commands while escalating to root do to relaxed sudo configuration on the local machine.

Barracuda Web App Firewall / Load Balancer Remote Root

Posted by deepcore under exploit (No Respond)

This Metasploit module exploits a remote command execution vulnerability in the Barracuda Web App Firewall Firmware version 8.0.1.007 and below and Load Balancer Firmware versions 5.4.0.004 and below by exploiting a vulnerability in the web administration interface. By sending a specially crafted request it’s possible to inject system commands while escalating to root do to […]

NetBSD mail.local(8) Local Root

Posted by deepcore under exploit (No Respond)

NetBSD mail.local(8) local root exploit that leverages a race condition as noted in NetBSD-SA2016-006.

TFTP Server 1.4 WRQ Buffer Overflow

Posted by deepcore under exploit (No Respond)

TFTP server version 1.4 WRQ buffer overflow exploit with egghunter shellcode.

http://www.maethacity.go.th/eg.htm

Posted by deepcore under defacement (No Respond)

http://www.maethacity.go.th/eg.htm notified by Dr.SiLnT HilL

Tags:

http://www.rungkayai.go.th

Posted by deepcore under defacement (No Respond)

http://www.rungkayai.go.th notified by ErrOr SquaD

Tags:

OpenSSHD 7.2p2 User Enumeration

Posted by deepcore under exploit (No Respond)

OpenSSHD versions 7.2p2 and below remote username enumeration exploit.

Cisco EPC3925 UPC Modem / Router Default Passphrase

Posted by deepcore under exploit (No Respond)

The default SSID and passphrase on the Cisco EPC3925 are derived from the MAC address and the DOCSIS serial number. Since the MAC address of the device is broadcasted via WiFi and the typical serial number is within the range 200.000.000 and 260.000.000, the default password can be brute-forced within minutes. Proof of concept included.