exploit the possibilities
Showing 1 - 7 of 7 RSS Feed

Files from Jens Regel

Email addressprivate
First Active2013-06-03
Last Active2020-05-07
View User Profile
SolarWinds MSP PME Cache Service Insecure File Permissions / Code Execution
Posted May 7, 2020
Authored by Jens Regel

SolarWinds MSP PME Cache Service versions prior to 1.1.15 suffer from insecure file permission and code execution vulnerabilities.

tags | exploit, vulnerability, code execution
advisories | CVE-2020-12608
MD5 | a91dde680d4e976a93c8e1a9abdfe345
CommSy 8.6.5 SQL Injection
Posted May 15, 2019
Authored by Jens Regel

CommSy version 8.6.5 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2019-11880
MD5 | 0aa181b0b3ef137ebde67a7a7ea633b0
ELO (Elektronischer Leitz-Ordner) 9 / 10 SQL Injection
Posted Jul 10, 2018
Authored by Jens Regel

ELO (Elektronischer Leitz-Ordner) versions 9 and 10 suffer from a remote time-based blind SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2018-10197
MD5 | fda5d95acef9735b638fd20d5bcc1144
3CX Phone System 15.5.3554.1 Directory Traversal
Posted Oct 16, 2017
Authored by Jens Regel

3CX Phone System version 15.5.3554.1 suffers from an authentication directory traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2017-15359
MD5 | a9779e9950c10976260d9d215e0f3f96
Miele Professional PG 8528 Directory Traversal
Posted Mar 24, 2017
Authored by Jens Regel

The Miele Professional PG 8528 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2017-7240
MD5 | 050cd30174f650cbbfac138073fe4caf
IBM Advanced Management Module Cross Site Scripting
Posted Aug 12, 2013
Authored by Jens Regel

The IBM Advanced Management module suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2013-4007
MD5 | 9cfa2d2f3311a439e87218ccfe6c5617
Netgear WPN824v3 Unauthorized Config Download
Posted Jun 3, 2013
Authored by Jens Regel

Netgear WPN824v3 allows for a remote party to download the configuration file unauthenticated.

tags | exploit, remote
MD5 | d55c0037ea595e02934c4ec94a8c58be
Page 1 of 1
Back1Next

File Archive:

May 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    14 Files
  • 2
    May 2nd
    3 Files
  • 3
    May 3rd
    1 Files
  • 4
    May 4th
    18 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    21 Files
  • 7
    May 7th
    15 Files
  • 8
    May 8th
    19 Files
  • 9
    May 9th
    1 Files
  • 10
    May 10th
    2 Files
  • 11
    May 11th
    18 Files
  • 12
    May 12th
    39 Files
  • 13
    May 13th
    15 Files
  • 14
    May 14th
    17 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    2 Files
  • 17
    May 17th
    2 Files
  • 18
    May 18th
    15 Files
  • 19
    May 19th
    21 Files
  • 20
    May 20th
    15 Files
  • 21
    May 21st
    15 Files
  • 22
    May 22nd
    6 Files
  • 23
    May 23rd
    1 Files
  • 24
    May 24th
    1 Files
  • 25
    May 25th
    2 Files
  • 26
    May 26th
    23 Files
  • 27
    May 27th
    13 Files
  • 28
    May 28th
    18 Files
  • 29
    May 29th
    17 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close