Skip to main content


  1. Facebook Vulnerability Reflected File Download =>
  2. EasyCafe Server <= 2.2.14 Remote File Read =>
  3. Notepad++ NPPFtp Plugin 0.26.3 - Buffer Overflow =>
  4. PFSense <= 2.2.5 - Directory Traversal =>
  5. PCMan FTP Server 2.0.7 - Buffer Overflow - MKD Command =>
  6. GoAutoDial CE 2.0 - Shell Upload =>
  7. Microsoft Office Word 2007 - RTF Object Confusion (ASLR and DEP Bypass) =>
  8. ProFTPd 1.3.5 (mod_copy) - Remote Command Execution =>
  9. Windows Media Center - Command Execution (MS15-100) =>
  10. ZTE PC UI USB Modem Software - Buffer Overflow =>
  11. Konica Minolta FTP Utility 1.0 - Remote Command Execution =>
  12. WinRar 5.21 - SFX OLE Command Execution =>
  13. WinRar < 5.30 beta 4 - Settings Import Command Execution =>
  14. GoAutoDial CE 3.3 - Multiple Vulnerabilities =>


Popular posts from this blog

WordSteal - Stealing Windows Credentials through crafted document

On every external pen-test I do after information gathering  and enumeration phase I prepare some spear-phishing campaigns. My favorite method is using Word Macros because most of the companies use a windows environment and the Microsoft Office pack is used widely. During a pen-test on of the problems that I faced was the mail gateway was rejecting every email that contained macro. Even if it was encoded,obfuscated, encrypted even empty the email gateway rejected our emails.  Since I hadn't some l33t 0day for all the version of Microsoft Word ( company used different versions) ,  I had to find a different way to spear-phish the employees. Then I remembered a post about a Word Exploit generator which used an unusual way to track how many times the document was opened. Microsoft Word had an undocumented function that can load a remote picture. The malware creators used http to map the users who opened the files. Then I thought why not trying the  'file://' han

SkyTower CTF Walkthrough

VM Author Description This CTF was designed by Telspace Systems for the CTF at the ITWeb Security Summit and BSidesCPT (Cape Town). The aim is to test intermediate to advanced security enthusiasts in their ability to attack a system using a multi-faceted approach and obtain the “flag”. You will require skills across different facets of system and application vulnerabilities, as well as an understanding of various services and how to attack them. Most of all, your logical thinking and methodical approach to penetration testing will come into play to allow you to successfully attack this system. Try different variations and approaches. You will most likely find that automated tools will not assist you. Author : Telspace Systems Download : VulnHub

Facebook Vulnerability Reflected File Download

Before starting with the write up i want to share the response that i got from facebook after reporting the bug. Hi Rio, Thank you for sharing this information with us. Although this issue does not qualify as a part of our bounty program we appreciate your report. We will follow up with you on any security bugs or with any further questions we may have. I will let you guys decide if its a vulnerability or not. Lets begin.