exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files from Humberto Cabrera

Email addresshumbe at zeroscience.mk
First Active2013-02-20
Last Active2019-01-22
ManageEngine OpManager 12.3 Privilege Escalation
Posted Jan 22, 2019
Authored by Humberto Cabrera | Site zeroscience.mk

ManageEngine OpManager version 12.3 suffers from a weak permissions issue in which an attacker can replace the service binary with a binary of his choice. This service runs as Localsystem thus allowing for a privilege escalation vector.

tags | exploit
SHA-256 | ae204681482d49485787e2089822da443639ee41864f734ff4cdc933bed5841c
Go Pro Fusion Studio 1.2 Privilege Escalation
Posted Sep 5, 2018
Authored by Humberto Cabrera | Site zeroscience.mk

Go Pro Fusion Studio version 1.2 suffers from a privilege escalation vulnerability.

tags | exploit
SHA-256 | 54f08c391ceb310b302b0a6d69afa0f46da60dead416f9ec53d22072161f8948
Sint Wind PI 01.26.19 Authentication Bypass
Posted Jun 5, 2018
Authored by Humberto Cabrera

Sint Wind PI version 01.26.19 suffers from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | 75a058c1e4408185eadda4db58ff7149ce94ba38afe34a983300dd97bb2d9801
Alienware Command Center 2.8.8.0 Local Privilege Escalation
Posted Feb 25, 2015
Authored by Humberto Cabrera | Site zeroscience.mk

Alienware Command Center version 2.8.8.0 suffers from an unquoted search path issue impacting the service 'ioloenergybooster' for Windows. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system.

tags | advisory, arbitrary, local
systems | windows
SHA-256 | 63f2538dadd62b01d9a1bdd72381e85972ffeb5361dcf205055e2e2870241cf9
Realtek 11n Wireless LAN Utility Privilege Escalation
Posted Feb 13, 2015
Authored by Humberto Cabrera

An unquoted service path vulnerability in Realtek 11n wireless LAN utility allow for privilege escalation.

tags | exploit
SHA-256 | 8edd0b8e4145ca253b1c8218791fcccd4e50c65d89ec06e4fce246341f7908e6
CloudFlare Versus Incapsula: Round 2
Posted Oct 30, 2013
Authored by LiquidWorm, Humberto Cabrera, Stefan Petrushevski | Site zeroscience.mk

This document contains the results of a second comparative penetration test conducted by a team of security specialists at Zero Science Lab against two cloud-based Web Application Firewall (WAF) solutions: Incapsula and Cloudflare. This test was designed to bypass security controls in place, in any possible way, circumventing whatever filters they have. Given the rise in application-level attacks, the goal of the test was to provide IT managers of online businesses with a comparison of these WAFs against real-world threats in simulated real-world conditions.

tags | paper, web
SHA-256 | 049e90fe97f45591ee478a6bbbd1000e75975f5dbc47b2e1e89cfc59d6426fdc
GLPI 0.83.8 SQL Injection
Posted Jun 20, 2013
Authored by Humberto Cabrera | Site zeroscience.mk

GLPI version 0.83.8 suffers from multiple error-based SQL injection vulnerabilities. Input passed via the POST parameter 'users_id_assign' in '/ajax/ticketassigninformation.php' script, POST parameter 'filename' in '/front/document.form.php' script, and POST parameter 'table' in 'glpi/ajax/comments.php' script is not properly sanitized before being used in SQL queries. This can be exploited by a malicious attacker to manipulate SQL queries by injecting arbitrary SQL code in the affected application.

tags | exploit, arbitrary, php, vulnerability, sql injection
SHA-256 | d4ea648da5ce15f6a9a9ff70fced4a4c2d50218825a23a4be4c56ea5f0f90ee9
GLPI 0.83.7 Parameter Traversal Arbitrary File Access
Posted Jun 19, 2013
Authored by Humberto Cabrera | Site zeroscience.mk

GLPI version 0.83.7 suffers from a parameter traversal vulnerability that allows for arbitrary file access.

tags | exploit, arbitrary
SHA-256 | 8c549c03c6d7b7e06618844943413d35622dfba90639b3c6ac5e75b5a16e3a25
CloudFlare Versus Incapsula Versus ModSecurity
Posted Feb 20, 2013
Authored by LiquidWorm, Humberto Cabrera, Stefan Petrushevski | Site zeroscience.mk

This document contains the results of a comparative penetration test conducted by a team of security specialists at Zero Science Lab against three 'leading' web application firewall solutions. The goal of the authors was to bypass security controls in place, in any way we can, circumventing whatever filters they have. This report also outlines the setup and configuration process, as well as a detailed security assessment.

tags | paper, web
SHA-256 | b7ec360c41751b864d585550e59e6ce9daffa5990a1e4421486df42ffc283b61
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close