cr

Easy Transfer 1.7 Cross Site Scripting / Directory Traversal

Easy Transfer version 1.7 for iOS suffers from cross site scripting and directory traversal vulnerabilities.




cr

ChemInv 1 Cross Site Scripting

ChemInv version 1 suffers from a persistent cross site scripting vulnerability.




cr

Online Scheduling System 1.0 Cross Site Scripting

Online Scheduling System version 1.0 suffers from a persistent cross site scripting vulnerability.




cr

PHP-Fusion 9.03.50 Cross Site Scripting

PHP-Fusion version 9.03.50 suffers from a persistent cross site scripting vulnerability.




cr

osTicket 1.14.1 Cross Site Scripting

osTicket version 1.14.1 suffers from a persistent cross site scripting vulnerability.




cr

WordPress WooCommerce Advanced Order Export 3.1.3 Cross Site Scripting

WordPress WooCommerce Advanced Order Export plugin version 3.1.3 suffers from a cross site scripting vulnerability.




cr

Online Clothing Store 1.0 Cross Site Scripting

Online Clothing Store version 1.0 suffers from a persistent cross site scripting vulnerability.




cr

Sentrifugo CMS 3.2 Cross Site Scripting

Sentrifugo CMS version 3.2 suffers from a persistent cross site scripting vulnerability.




cr

iChat 1.6 Cross Site Scripting

iChat version 1.6 suffers from a cross site scripting vulnerability.




cr

OpenZ ERP 3.6.60 Cross Site Scripting

OpenZ ERP version 3.6.60 suffers from a persistent cross site scripting vulnerability.




cr

Draytek VigorAP Cross Site Scripting

Draytek VigorAP suffers from a persistent cross site scripting vulnerability. Multiple different versions are affected.




cr

Tiny MySQL Cross Site Scripting

Tiny MySQL suffers from a cross site scripting vulnerability.




cr

WebTareas 2.0p8 Cross Site Scripting

WebTareas version 2.0p8 suffers from a cross site scripting vulnerability.




cr

WordPress Dosimple Theme 2.0 Cross Site Scripting

WordPress Dosimple theme version 2.0 suffers from a cross site scripting vulnerability.








cr

Phrack - Attacking JavaScript Engines

Phrack: Attacking JavaScript Engines: A case study of JavaScriptCore and CVE-2016-4622.




cr

Phrack - Viewer Discretion Advised - (De)coding An iOS Kernel Vulnerability

Phrack Viewer Discretion Advised write up called (De)coding an iOS Kernel Vulnerability.




cr

CHIYU BF430 TCP IP Converter Cross Site Scripting

CHIYU BF430 TCP IP Converter suffers from a persistent cross site scripting vulnerability.




cr

Yes, You Can Remotely Hack Factory, Building Site Cranes. Wait, What?





cr

Aastra IP Telephone Crypto Failure

The Aastra 6753i IP telephone uses 3DES encrypted payloads in ECB mode to pass configuration files, allowing for modification to the phone's set up.




cr

Design And Implementation Of A Voice Encryption System For Telephone Networks

This whitepaper goes into detail on design and implementation details for performing voice encryption on telephone networks. Written in Spanish.




cr

Juniper Secure Access Cross Site Scripting

Juniper Secure Access suffers from a cross site scripting vulnerability. SA Appliances running Juniper IVE OS 6.0 or higher are affected.




cr

Juniper SRX Critical Denial Of Service

The Juniper SRX suffers from a dual-homed swapfile overflow error that can cause denial of service conditions.




cr

Juniper SSL VPN Bypass / Cross Site Scripting

This is a list of older cross site scripting and bypass vulnerabilities associated with older Juniper IVE releases.




cr

Juniper Secure Access Cross Site Scripting

Juniper Secure Access software suffers from a reflective cross site scripting vulnerability.




cr

Juniper JunOS 9.x Cross Site Scripting

Juniper JunOS version 9.x suffers from a html injection vulnerability that allows for cross site scripting attacks.





cr

Dr. Anthony Fauci Forced To Beef Up Security As Death Threats Increase




cr

Running Encrypted ELF Binaries In Memory

Whitepaper called Blue Team vs. Red Team: How to run your encrypted binaries in memory and go undetected. This paper discusses the golden frieza project.




cr

From Zero Credentials To Full Domain Compromise

Whitepaper called From Zero Credentials to Full Domain Compromise. This paper covers techniques penetration testers can use in order to accomplish an initial foothold on target networks and achieve full domain compromise without executing third party applications or reusing clear text credentials.




cr

Blind CreateRemoteThread Privilege Escalation

Whitepaper called Blind CreateRemoteThread Privilege Escalation.




cr

Packet Storm Exploit 2013-1022-1 - Microsoft Silverlight Invalid Typecast / Memory Disclosure

This exploit leverages both invalid typecast and memory disclosure vulnerabilities in Microsoft Silverlight 5 in order to achieve code execution. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected".




cr

Packet Storm Advisory 2013-1022-1 - Microsoft Silverlight Invalid Typecast / Memory Disclosure

Microsoft Silverlight 5 suffers from invalid typecast and memory disclosure vulnerabilities that, when leveraged together, allow for arbitrary code execution. A memory disclosure vulnerability exists in the public WriteableBitmap class from System.Windows.dll. This class allows reading of image pixels from the user-defined data stream via the public SetSource() method. BitmapSource.ReadStream() allocates and returns byte array and a count of array items as out parameters. These returned values are taken from the input stream and they can be fully controlled by the untrusted code. When returned "count" is greater than "array.Length", then data outside the "array" are used as input stream data by the native BitmapSource_SetSource() from agcore.dll. Later all data can be viewed via the public WriteableBitmap.Pixels[] property. Exploitation details related to these findings were purchased through the Packet Storm Bug Bounty program.




cr

Microsoft Internet Explorer COALineDashStyleArray Unsafe Memory Access

This Metasploit module exploits a vulnerability on Microsoft Silverlight. The vulnerability exists on the Initialize() method from System.Windows.Browser.ScriptObject, which access memory in an unsafe manner. Since it is accessible for untrusted code (user controlled) it's possible to dereference arbitrary memory which easily leverages to arbitrary code execution. In order to bypass DEP/ASLR a second vulnerability is used, in the public WriteableBitmap class from System.Windows.dll. This Metasploit module has been tested successfully on IE6 - IE10, Windows XP SP3 / Windows 7 SP1 on both x32 and x64 architectures.




cr

Microsoft Windows Firewall Disabling Shellcode

644 bytes small Microsoft Windows x86 shellcode that disables the Windows firewall, adds the user MajinBuu with password TurnU2C@ndy!! to the system, adds the user MajinBuu to the local groups Administrators and Remote Desktop Users, and then enables the RDP Service.




cr

Microsoft Windows Kernel REG_RESOURCE_LIST Memory Disclosure

The Microsoft Windows kernel suffers from a 64-bit pool memory disclosure vulnerability via REG_RESOURCE_LIST registry values (CmResourceTypeDevicePrivate entries).




cr

Microsoft Windows Kernel REG_RESOURCE_LIST Memory Disclosure

The Microsoft Windows kernel suffers from a 64-bit pool memory disclosure vulnerability via REG_RESOURCE_LIST registry values (videoprt.sys descriptors).




cr

Microsoft Windows Kernel REG_RESOURCE_REQUIREMENTS_LIST Memory Disclosure

The Microsoft Windows kernel suffers from a 64-bit pool memory disclosure vulnerability via REG_RESOURCE_REQUIREMENTS_LIST registry values.




cr

Microsoft Windows Desktop Bridge Privilege Escalation

Microsoft Windows suffers from a Desktop Bridge Virtual Registry arbitrary file read / write privilege escalation vulnerability.




cr

Microsoft Windows Desktop Bridge Privilege Escalation

Microsoft Windows suffers from a Desktop Bridge Virtual Registry NtLoadKey arbitrary file read / write privilege escalation vulnerability.




cr

Microsoft Windows Desktop Bridge Virtual Registry Incomplete Fix

The handling of the virtual registry for desktop bridge applications can allow an application to create arbitrary files as system resulting in privilege escalation. This is because the fix for CVE-2018-0880 (MSRC case 42755) did not cover all similar cases which were reported at the same time in the issue.




cr

Ivanti Workspace Control Registry Stored Credentials

A flaw was found in Workspace Control that allows a local unprivileged user to retrieve the database or Relay server credentials from the Windows Registry. These credentials are encrypted, however the encryption that is used is reversible. This issue was successfully verified on Ivanti Workspace Control version 10.2.700.1 and 10.2.950.0.




cr

Microsoft Windows 10 UAC Bypass By computerDefault

This exploit permits an attacker to bypass UAC by hijacking a registry key during computerSecurity.exe (auto elevate windows binary) execution.




cr

Microsoft Windows 10 User Sessions Stuck

This exploit modifies a windows language registry key which causes some windows binaries to stick, including login which makes the session unusable. The key is in HKCU and can be modified without admin rights, but with a bypass UAC, all user sessions can be paralyzed by using reg.exe and user's NTUSER.DAT.




cr

Microsoft Windows .Reg File / Dialog Box Message Spoofing

The Windows registry editor allows specially crafted .reg filenames to spoof the default registry dialog warning box presented to an end user. This can potentially trick unsavvy users into choosing the wrong selection shown on the dialog box. Furthermore, we can deny the registry editor its ability to show the default secondary status dialog box (Win 10), thereby hiding the fact that our attack was successful.




cr

Microsoft Windows CmKeyBodyRemapToVirtualForEnum Arbitrary Key Enumeration

The Microsoft Windows kernel's Registry Virtualization does not safely open the real key for a virtualization location leading to enumerating arbitrary keys resulting in privilege escalation.