what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files from Sebastian Muniz

First Active2007-11-28
Last Active2014-03-26
Allied Telesis AT-RG634A Unauthenticated Webshell
Posted Mar 26, 2014
Authored by Sebastian Muniz

Allied Telesis AT-RG634A ADSL broadband router has hidden administrative unauthenticated webshell that allows for command injection.

tags | exploit
advisories | CVE-2014-1982
SHA-256 | e3656907ce60bc967c703eead969f7f9b2ab164514e55b51d9246f8a9fad51ca
Core Security Technologies Advisory 2008.0125
Posted Jun 11, 2008
Authored by Core Security Technologies, Sebastian Muniz | Site coresecurity.com

Core Security Technologies Advisory - A vulnerability was found in CitectSCADA that could allow a remote un-authenticated attacker to force an abnormal termination of the vulnerable software (Denial of Service) or to execute arbitrary code on vulnerable systems to gain complete control of the software. To accomplish such goal the would-be attacker must be able to connect to the vulnerable service on a TCP high-port.

tags | advisory, remote, denial of service, arbitrary, tcp
advisories | CVE-2008-2639
SHA-256 | 19bd45b897c6982edbb11d71c9c88e4b43443d02180be90c94917a52bf3de427
Core Security Technologies Advisory 2008.0415
Posted May 20, 2008
Authored by Core Security Technologies, Sebastian Muniz | Site coresecurity.com

Core Security Technologies Advisory - The Borland Interbase 2007 database server is vulnerable to an integer overflow when a malformed packet is sent to the default TCP port 3050. The integer overflow can cause a stack overflow, which allows arbitrary code execution with system privileges. Service pack 2 (0.1.0.256) on Solaris and Windows are both vulnerable.

tags | advisory, overflow, arbitrary, tcp, code execution
systems | windows, solaris
advisories | CVE-2008-0467
SHA-256 | 162a64117efd8eb84f7236e3d10643be16aefc4e640167283fec90fcd738ad1a
Core Security Technologies Advisory 2008.0129
Posted May 6, 2008
Authored by Core Security Technologies, Sebastian Muniz | Site coresecurity.com

Core Security Technologies Advisory - A vulnerability was found in Wonderware SuiteLink Service ('slssvc.exe') that could allow an un-authenticated remote attacker with the ability to connect to the SuiteLink service TCP port to shutdown the service abnormally by sending a malformed packet. Exploitation of the vulnerability for remote code execution has not been proven, but it has not been eliminated as a potential scenario.

tags | advisory, remote, tcp, code execution
advisories | CVE-2008-2005
SHA-256 | cc0017282284a81e4c1b8b21a4c4538842f8dc45ce9d672ef98b6df5d880f5e1
Core Security Technologies Advisory 2008.0123
Posted Mar 19, 2008
Authored by Core Security Technologies, Sebastian Muniz | Site coresecurity.com

Core Security Technologies Advisory - MacOS X Server 10.5, also known as Leopard Server, features a Wiki Server, which is a multiuser web application written in Python. The Wiki Server is vulnerable to a path traversal attack, which can be exploited by non-privileged system users via a forged file upload to write arbitrary files on locations in the server filesystem, restricted only by privileges of the Wiki Server application.

tags | exploit, web, arbitrary, python, file upload
advisories | CVE-2008-1000
SHA-256 | c67ec7aad2757e9458328c5a8740092dd9f2f141c751d7cdcaf51eb246f95da2
Core Security Technologies Advisory 2008.0204
Posted Mar 13, 2008
Authored by Core Security Technologies, Sebastian Muniz | Site coresecurity.com

Core Security Technologies Advisory - Timbuktu Pro suffers from remote path traversal and log injection vulnerabilities.

tags | exploit, remote, vulnerability
advisories | CVE-2008-1117, CVE-2008-1118
SHA-256 | d86243f80adb465a8eb0832d5b4b1a1dc8921c5e790c1bef0c2f4f28fc78447c
Core Security Technologies Advisory 2007.0821
Posted Nov 28, 2007
Authored by Core Security Technologies, Sebastian Muniz | Site coresecurity.com

Core Security Technologies Advisory - Lotus Notes suffers from a buffer overflow vulnerability in the Lotus WorkSheet file processor.

tags | advisory, overflow
SHA-256 | def9e3f9e9a61d8f256c986eaf93946e126019f6138919a51a98b739d7e78cb8
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close