cr

Internet Explorer Script Interjection Code Execution

The vulnerability described in this document can be exploited by a malicious Web page to execute arbitrary code with low integrity. Active scripting must be enabled, and the present exploitation techniques require that font downloading be set to "Enable" or "Prompt" and that the "mailto:" protocol be present. (These requirements are satisfied by default on Windows XP, Windows Vista, and Windows 7.) The user is presented with a message box which must be dismissed before code execution can occur.




cr

Internet Explorer Script Interjection Code Execution

The vulnerability described in this document can be exploited by a malicious Web page to execute arbitrary code with low integrity. Active scripting must be enabled, and the present exploitation techniques require that font downloading be set to "Enable" or "Prompt" and that the "mailto:" protocol be present. (These requirements are satisfied by default on Windows XP, Windows Vista, and Windows 7.) The user is presented with a message box which must be dismissed before code execution can occur.




cr

MS14-060 Microsoft Windows OLE Package Manager Code Execution

This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, publicly known as "Sandworm". Platforms such as Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable.




cr

MS14-064 Microsoft Windows OLE Package Manager Code Execution

This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, publicly exploited in the wild as MS14-060 patch bypass. The Microsoft update tried to fix the vulnerability publicly known as "Sandworm". Platforms such as Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. However, based on our testing, the most reliable setup is on Windows platforms running Office 2013 and Office 2010 SP2. And please keep in mind that some other setups such as using Office 2010 SP1 might be less stable, and sometimes may end up with a crash due to a failure in the CPackage::CreateTempFileName function.




cr

MS14-064 Microsoft Windows OLE Package Manager Code Execution Through Python

This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, bypassing the patch MS14-060, for the vulnerability publicly known as "Sandworm", on systems with Python for Windows installed. Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. However, based on our testing, the most reliable setup is on Windows platforms running Office 2013 and Office 2010 SP2. Please keep in mind that some other setups such as those using Office 2010 SP1 may be less stable, and may end up with a crash due to a failure in the CPackage::CreateTempFileName function.




cr

HP Data Protector Encrypted Communication Remote Command Execution

This Metasploit module exploits a well known remote code execution exploit after establishing encrypted control communications with a Data Protector agent. This allows exploitation of Data Protector agents that have been configured to only use encrypted control communications. This exploit works by executing the payload with Microsoft PowerShell so will only work against Windows Vista or newer. Tested against Data Protector 9.0 installed on Windows Server 2008 R2.









cr

Solaris 11.4 xscreensaver Privilege Escalation

Solaris version 11.4 xscreensaver local privilege escalation exploit.




cr

Solaris xscreensaver Privilege Escalation

This Metasploit module exploits a vulnerability in xscreensaver versions since 5.06 on unpatched Solaris 11 systems which allows users to gain root privileges. xscreensaver allows users to create a user-owned file at any location on the filesystem using the -log command line argument introduced in version 5.06. This module uses xscreensaver to create a log file in /usr/lib/secure/, overwrites the log file with a shared object, and executes the shared object using the LD_PRELOAD environment variable. This module has been tested successfully on xscreensaver version 5.15 on Solaris 11.1 (x86) and xscreensaver version 5.15 on Solaris 11.3 (x86).




cr

Why Big ISPs Aren't Happy About Google's Plans For Encrypted DNS








cr

Open-Xchange OX App Suite Content Spoofing / Cross Site Scripting

Open-Xchange OX App Suite suffers from a content spoofing, cross site scripting, and information disclosure vulnerabilities. Versions affected vary depending on the vulnerability.




cr

CurveBall Microsoft Windows CryptoAPI Spoofing Proof Of Concept

This is a proof of concept exploit that demonstrates the Microsoft Windows CryptoAPI spoofing vulnerability as described in CVE-2020-0601 and disclosed by the NSA.




cr

Git Credential Helper Protocol Newline Injection

A git clone action can leak cached / stored credentials for github.com to example.com due to insecure handling of newlines in the credential helper protocol.




cr

PTP-RAT Screen Share Proof Of Concept

PTP-RAT is a proof of concept that allows data theft via screen-share protocols. Each screen flash starts with a header. This contains a magic string, "PTP-RAT-CHUNK" followed by a sequence number. When the receiver is activated, it starts taking screenshots at twice the transmission frequency (the Nyquist rate). When it detects a valid header, it decodes the pixel colour information and waits on the next flash. As soon as a valid header is not detected, it reconstructs all the flashes and saves the result to a file. To transfer a file, you run an instance of the Rat locally on your hacktop, and set that up as a receiver. Another instance is run on the remote server and this acts as a sender. You simply click on send file, and select a file to send. The mouse pointer disappears and the screen begins to flash as the file is transmitted via the pixel colour values. At the end of the transfer, a file-save dialog appears on the receiver, and the file is saved.




cr

Macs Framework 1.14f Cross Site Scripting / SQL Injection

Macs Framework version 1.14f suffers from cross site scripting and remote SQL injection vulnerabilities.




cr

Project Open CMS 5.0.3 Cross Site Scripting / SQL Injection

Project Open CMS version 5.0.3 suffers from cross site scripting and remote SQL injection vulnerabilities.




cr

hits script 1.0 SQL Injection

hits script version 1.0 suffers from a remote SQL injection vulnerability.




cr

Creative Zone SQL Injection

Creative Zone suffers from a remote SQL injection vulnerability.




cr

XBOX 360 Aurora 0.6b Default Credentials / FTP Bruteforcer

XBOX 360 Aurora version 0.6b default credential FTP bruteforcing script.




cr

NTCrackPipe 1.0 Local Windows Account Cracker

NTCrackPipe is a basic local Windows account cracking tool.




cr

RC4 Simple FILE Encryption / Decryption

Simple script to perform RC4 encryption / decryption.




cr

XOR File Encryption / Decryption

Script to perform basic XOR file encryption / decryption.




cr

NTCrackPipe 2.0

NTCrackPipe is a basic local Windows account cracking tool.




cr

Brain Hack Devices Must Be Scrutinized, Say Top Scientists






cr

Critical FreeBSD Bug Squashed

















cr

Avast Anti-Virus Local Credential Disclosure

Avast Anti-Virus versions prior to 19.1.2360 suffer from a local credential disclosure vulnerability.




cr

Symantec Mobile Encryption For iPhone 2.1.0 Denial Of Service

Symantec Mobile Encryption for iPhone version 2.1.0 suffers from a denial of service vulnerability.