what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Simon Bieber

Email addresssbieber at secuvera.de
First Active2013-04-03
Last Active2021-06-11
NetSetManPro 4.7.2 Privilege Escalation
Posted Jun 11, 2021
Authored by Simon Bieber

NetSetManPro version 4.7.2 suffers from a privilege escalation vulnerability.

tags | exploit
advisories | CVE-2021-34546
SHA-256 | e8a3f23fc7f163c05873cbfb945bc19268910c026e3331a239742efa41af0936
Streamworks Job Scheduler Release 7 Authentication Weakness
Posted Jan 16, 2019
Authored by Simon Bieber

Streamworks Job Scheduler Release 7 has all agents using the same X.509 certificates and keys issued by the vendor for authentication. The processing server component does not check received messages properly for authenticity. Agents installed on servers do not check received messages properly for authenticity. Agents and processing servers are vulnerable to the TLS Heartbleed attack.

tags | exploit
advisories | CVE-2014-0160
SHA-256 | 8d3ab2a2e1407bcba852d7925fccb15e6610ced1db687ba89dc4e1333028ea6d
OCS Inventory NG ocsreports 2.4 / 2.3.1 SQL Injection
Posted Apr 10, 2018
Authored by Simon Bieber

OCS Inventory NG ocsreports versions 2.4 and 2.3.1 suffer from remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | e7fc54d755c00801636a6217329e667a3c538290ff2ad25a1fe2d5f5a446d2f5
OCS Inventory NG ocsreports 2.4 Cross Site Scripting
Posted Apr 10, 2018
Authored by Simon Bieber

OCS Inventory NG ocsreports version 2.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 927f922342cae04cf72a1791db35f1d83533db1be55191b9a64f59848621cba9
OPSI Managed Client Remote Command Execution
Posted Jan 31, 2017
Authored by Simon Bieber

A remote attacker with knowledge of a single machine name and the corresponding OPSI machine key is able to execute arbitrary commands on any OPSI Managed client in the same managed environment by using the Remote Procedure Call (RPC) Interface of the OPSI-Server. The attacker is able to use the SYSTEM privileges of the OPSI Agent on any managed client computer and execute arbitrary commands leading to an elevation of privileges. Affected includes OPSI Server version 4.0.7.26 and OPSI ClientAgent version 4.0.7.10-1.

tags | exploit, remote, arbitrary
SHA-256 | 444597f83e9e0ad48a430a35373f0bc6a018226b622b3ff1e949820391597d37
e107 CMS 1.0.2 Cross Site Scripting
Posted Apr 3, 2013
Authored by Simon Bieber

e107 CMS version 1.0.2 suffers from a reflective cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2013-2750
SHA-256 | b0a7d7d19b1bf2785fccdbdb0f2175d28946b402c3fbfdcc3590de48c18ffc57
Page 1 of 1
Back1Next

File Archive:

February 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    16 Files
  • 2
    Feb 2nd
    19 Files
  • 3
    Feb 3rd
    0 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    2 Files
  • 7
    Feb 7th
    10 Files
  • 8
    Feb 8th
    25 Files
  • 9
    Feb 9th
    37 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    20 Files
  • 14
    Feb 14th
    25 Files
  • 15
    Feb 15th
    15 Files
  • 16
    Feb 16th
    6 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    35 Files
  • 20
    Feb 20th
    25 Files
  • 21
    Feb 21st
    18 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close