exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2014-08-03

CAS Autodiscover Enumeration
Posted Aug 3, 2014
Authored by Nathan Power

The Microsoft Exchange Client Access Server (CAS) that services Autodiscover has been found vulnerable to an information disclosure. It has been discovered that a standard domain user without Exchange permissions can enumerate Autodiscover configuration files of Exchange users by an XML SOAP parameter injection.

tags | exploit, info disclosure
SHA-256 | 54c985d67107ade894f094c2b0fe43f071b3e549fb3bf44c8d221541460ae91e
CAS Timing Attack
Posted Aug 3, 2014
Authored by Nathan Power

The Client Access Server (CAS) that services Autodiscover and Outlook Web App (OWA) has been found to be vulnerable to time-based authentication attacks. It has been discovered that when sending authentication requests to the CAS, behavior in the timing of the responses can be used to verify Active Directory (AD) realms and usernames within those realms. Authentication timing issues have been found in specific IIS file paths and OWA form-based authentication. This issue can allow an attacker to confirm the existence of a specific username in the directory, and will make other attacks such as password guessing or social engineering attacks more successful.

tags | advisory, web
SHA-256 | 061b94a5edc404d05361b21ffb528c06f80aa1cef15fbbc558442730005bf285
Microsoft Exchange Internal IP Disclosure
Posted Aug 3, 2014
Authored by Nathan Power

Multiple issues have been discovered that makes it possible to disclose internal IP addresses of remote Microsoft Exchange environments.

tags | exploit, remote
SHA-256 | 1583d0211f9142e47c610ac0fa845c95f421e39d1782f40c8b7bdb1923355789
IPTables Bash Completion 1.2
Posted Aug 3, 2014
Authored by AllKind | Site sourceforge.net

iptables-bash_completion provides programmable completion for the iptables and ip6tables programs from netfilter.org. Following the logic of iptables, options are shown only if they are valid at the current context. Additionally to the completion on options, matches and targets, it supports dynamic retrieval of data from the system i.e: chain-, set-names, interfaces, hostnames, etc. Environment variables allow to fine grade completion options. IP and MAC addresses can be fed by file.

Changes: Added the -w, --wait [seconds] option. Added more conntrack helpers. Updated time range in copyright header. Allowed xdigit to be written as 0x or 0X. Various other bug fixes, additions, and removals.
tags | tool, firewall
systems | linux, unix
SHA-256 | 5b95ff2d4925704d59bad3c06ff3236538ddba11b05cf2e9a1c8ef2856b2ca80
Photo WiFi Transfer 1.01 Directory Traversal
Posted Aug 3, 2014
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Photo WiFi Transfer version 1.01 suffers from a directory traversal vulnerability.

tags | exploit
SHA-256 | 1aa823b490ae3034f340604d446c57cda18cd37a0e00d5b90ff571baddb13c0f
Sphider Search Engine Command Execution / SQL Injection
Posted Aug 3, 2014
Authored by Shayan Sadigh

Sphider versions prior to 1.3.6 suffer from remote command execution and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
advisories | CVE-2014-5081, CVE-2014-5082, CVE-2014-5083, CVE-2014-5084, CVE-2014-5085, CVE-2014-5086, CVE-2014-5087
SHA-256 | bec986214c397a937254385b2f0337a5a584dbc4ff7e00734b9bc377c4066878
Status2k XSS / SQL Injection / Command Execution
Posted Aug 3, 2014
Authored by Shayan Sadigh

Status2k server monitoring software suffers from cross site scripting, remote command execution, information disclosure, and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection, info disclosure
advisories | CVE-2014-5088, CVE-2014-5089, CVE-2014-5090, CVE-2014-5091, CVE-2014-5092, CVE-2014-5093, CVE-2014-5094
SHA-256 | dad0340bdf5e7906eedba0edc8b1b611d19dccd29edc0a3c822aa85bcf6ebcce
WordPress Gmedia Gallery 1.2.1 Shell Upload
Posted Aug 3, 2014
Authored by Claudio Viviani

WordPress Gmedia Gallery version 1.2.1 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | ada74cee2453653efa88820002f6372519feaccf001d06065f6ef793721257a2
WordPress SI CAPTCHA Cross Site Scripting
Posted Aug 3, 2014
Authored by Ashiyane Digital Security Team

WordPress SI CAPTCHA anti-spam plugin suffers from a cross site scripting vulnerability. Note that this finding houses site-specific data.

tags | exploit, xss
SHA-256 | 496ce86c42c0989ac8f5097875beb5aef7f0b190c0d28fb474cf96b7c16b50b3
WordPress Gamespeed Theme Cross Site Scripting
Posted Aug 3, 2014
Authored by Ashiyane Digital Security Team

WordPress Gamespeed Theme suffers from a cross site scripting vulnerability. Note that this finding houses site-specific data.

tags | exploit, xss
SHA-256 | 4dffcd3646f2f16f700273d8af9755e703255a2a3afbcf1090dded0c91f5f2d7
WordPress MyBand Theme Cross Site Scripting
Posted Aug 3, 2014
Authored by ACC3SS

WordPress MyBand theme suffers from a cross site scripting vulnerability. This finding houses site-specific data.

tags | exploit, xss
SHA-256 | 117ffb3b858d7a1be734b0e661c3e5e48ee0e3e8cc8f5900ff0a5f087910767a
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close