header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Cisco EPC3925 � Cross Site Request Forgery

This proof of concept demonstrates that the admin password can be changed by an attacker in a CSRF attack. However, it seems like any setting in the device can be manipulated using an attack like this. The device does not ask for the current password.

UPC Ireland Cisco EPC 2425 Router / Horizon Box

The Cisco EPC 2425 routers supplied by UPC are vulnerable to an offline dictionary attack if the WPA-PSK handshake is obtained by an attacker. The WPA-PSK pass phrase has the following features: Random, A to Z Uppercase only, 8 characters long, 208,827,064,576 possible combinations ( AAAAAAAA – ZZZZZZZZ ) 26^8. We recently purchased a used rig, comprising off: Windows 7, I3 Processor, 4GB RAM, 2TB Drive, Radeon HD 5850. We generated 26 dictionary files using “mask processor” by ATOM, piping each letter out to its own file, for example: A: ./mp32 A?u?u?u?u?u?u?u > A.TXT = AAAAAAAA – AZZZZZZZ. Using our Radeon HD5850 on standard settings, we were hitting 80,000 keys per second. Breakdown below: 26^8 = 208,827,064,576 ( 208 billion possible combinations ) 26^8 / 80,000 keys per second = 2,610,338 seconds. For €185, we had built a computer that could crack the default UPC wireless password within 30 days. The WPA-PSK handshakes were obtained using airodump-ng.

Phone Drive Eightythree 4.1.1 iOS – Multiple Vulnerabilities

The Vulnerability Laboratory Research Team discovered multiple web vulnerabilities in the official Eigthythree Phone Drive v4.1.1 iOS mobile application. The remote web vulnerability allows to inject local commands via vulnerable system values to compromise the apple iOS mobile web-application. The injection point is the `file` value of the `/app/file.php` file and the execution point is the `/app/file.php` file.

PotPlayer 1.5.42509 Beta – DOS(Integer Division by Zero Exploit)

PotPlayer 1.5.42509 Beta is vulnerable to an Integer Division by Zero Exploit. This vulnerability can be exploited by creating a malicious file with a specially crafted header. When the file is opened in PotPlayer, it will cause a divide-by-zero exception, resulting in a denial of service.

PENTAGRAM Cerberus P 6363 DSL Router Multiple Vulnerabilities

Cerberus P 6363 DSL Router is vulnerable to Authentication Bypass and Multiple Cross Site Scripting. Authentication Bypass can be exploited by setting a special cookie before accessing the GUI. Multiple Cross Site Scripting can be exploited by turning off JavaScript or writing some simple scripts that won't interpret JS code like web browser does.

Castripper 2.50.70 (.pls) exploit (Stack buffer overflow/DEP bypass)

This exploit is for Castripper 2.50.70 (.pls) which is a stack buffer overflow/DEP bypass exploit. It uses ROP gadgets from the application's DLLs and a hardcoded SetProcessDEPPolicy() address. It also uses POP EDX, POP EBP, POP EBX, POP EDI, POP ESI, and PUSHAD instructions to bypass DEP.

Recent Exploits: