Exploit the possiblities
Showing 1 - 5 of 5 RSS Feed

Files from Maurizio Agazzini

Email addressinode at mediaservice.net
First Active2008-06-13
Last Active2016-11-24
Red Hat JBoss EAP 5.2.x Untrusted Data Deserialization
Posted Nov 24, 2016
Authored by Maurizio Agazzini, Federico Dotta

JBoss EAP's JMX Invoker Servlet is exposed by default on port 8080/TCP. The communication employs serialized Java objects, encapsulated in HTTP requests and responses. The server deserializes these objects without checking the object type. This behavior can be exploited to cause a denial of service and potentially execute arbitrary code.

tags | exploit, java, web, denial of service, arbitrary, tcp
advisories | CVE-2016-7065
MD5 | eaea199662dd8fa71b42b12d170d351d
IBM WebSphere 7 / 8 / 8.5 / 9 Deserialization Issue
Posted Oct 11, 2016
Authored by Maurizio Agazzini

IBM WebSphere versions 7, 8, 8.5, and 9 deserialize untrusted data. This can lead to denial of service and remote code execution vulnerabilities.

tags | exploit, remote, denial of service, vulnerability, code execution
advisories | CVE-2016-5983
MD5 | f21b4f91dfaa2289b5b1b9a16af96136
McAfee VirusScan Enterprise 8.8 Security Bypass
Posted Mar 5, 2016
Authored by Maurizio Agazzini

McAfee VirusScan Enterprise versions 8.8 and below suffer from a security restrictions bypass vulnerability.

tags | exploit, bypass
MD5 | cce402391275681076c310ea79fe77a1
Sudo 1.7.2p5 Local Privilege Escalation
Posted Apr 20, 2010
Authored by Maurizio Agazzini, Valerio Costamagna | Site lab.mediaservice.net

sudoedit as found in sudo versions 1.7.2p5 and below fails to verify the path of the executable and therefore allows for an easy to exploit local privilege escalation vulnerability.

tags | exploit, local
advisories | CVE-2010-1163
MD5 | 9b4e6b76c052c87f529fda87d785353d
snmpv3_exp.tgz
Posted Jun 13, 2008
Authored by Maurizio Agazzini | Site lab.mediaservice.net

SNMPv3 HMAC validation error remote authentication bypass exploit.

tags | exploit, remote
advisories | CVE-2008-0960
MD5 | 8b361d84155829c8b08e4342f8db6aa2
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

January 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    16 Files
  • 4
    Jan 4th
    39 Files
  • 5
    Jan 5th
    26 Files
  • 6
    Jan 6th
    40 Files
  • 7
    Jan 7th
    2 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    25 Files
  • 10
    Jan 10th
    28 Files
  • 11
    Jan 11th
    44 Files
  • 12
    Jan 12th
    32 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    4 Files
  • 15
    Jan 15th
    31 Files
  • 16
    Jan 16th
    15 Files
  • 17
    Jan 17th
    16 Files
  • 18
    Jan 18th
    24 Files
  • 19
    Jan 19th
    0 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close