exploit the possibilities
Showing 1 - 7 of 7 RSS Feed

Files from Peter Osterberg

Real NamePeter Österberg
Email addressprivate
First Active2008-07-10
Last Active2012-01-11
View User Profile
OP5 license.php Remote Command Execution
Posted Jan 11, 2012
Authored by Peter Osterberg | Site metasploit.com

This Metasploit module exploits an arbitrary root command execution vulnerability in the OP5 Monitor license.php. Ekelow has confirmed that OP5 Monitor versions 5.3.5, 5.4.0, 5.4.2, 5.5.0, 5.5.1 are vulnerable.

tags | exploit, arbitrary, root, php
advisories | CVE-2012-0261, OSVDB-78064
MD5 | f56e71f6cad24b66968a2d299cc40174
OP5 welcome Remote Command Execution
Posted Jan 11, 2012
Authored by Peter Osterberg | Site metasploit.com

This Metasploit module exploits an arbitrary root command execution vulnerability in OP5 Monitor welcome. Ekelow AB has confirmed that OP5 Monitor versions 5.3.5, 5.4.0, 5.4.2, 5.5.0, 5.5.1 are vulnerable.

tags | exploit, arbitrary, root
advisories | CVE-2012-0262, OSVDB-78065
MD5 | 06651e387f56f87eef89ae965ba609fc
OP5 Command Execution / Information Disclosure
Posted Jan 9, 2012
Authored by Peter Osterberg

OP5 suffers from poor session management, credential leakage and multiple remote root command execution vulnerabilities.

tags | exploit, remote, root, vulnerability
advisories | CVE-2012-0261, CVE-2012-0262, CVE-2012-0263, CVE-2012-0264
MD5 | 036e614569d9b74c790e04f95141919d
Ability Server 2.34 STOR Command Stack Buffer Overflow
Posted Dec 7, 2011
Authored by muts, Dark Eagle, Peter Osterberg | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in Ability Server 2.34. Ability Server fails to check input size when parsing STOR and APPE commands, which leads to a stack based buffer overflow. This plugin uses the STOR command. The vulnerability has been confirmed on version 2.34 and has also been reported in version 2.25 and 2.32. Other versions may also be affected.

tags | exploit, overflow
MD5 | 1a597212c834907605b2256ea8200bd5
Updated SAP MaxDB 7.6.03 Build 007 Pre-Auth Code Execution
Posted Feb 9, 2010
Authored by Luigi Auriemma, Peter Osterberg | Site aluigi.org

Remote exploit for SAP MaxDB versions 7.6.03 build 007 and below which suffer from a pre-authentication remote code execution vulnerability. This version has been updated by FortConsult A/S to use the same byte code as the Nessus plugin.

tags | exploit, remote, code execution
MD5 | 32c6cabe1db27fbf0308144890b2d306
Advisory-DWR.pdf
Posted Jul 10, 2008
Authored by Peter Osterberg | Site fortconsult.net

Direct Web Rendering (DWR) version 2.0.1 suffers from a cross site scripting vulnerability.

tags | advisory, web, xss
advisories | CVE-2008-2740
MD5 | 377d17490f5fdf8a4323108cbce18fa9
site_wide_xss.pdf
Posted Jul 10, 2008
Authored by Peter Osterberg, Anders H Salling | Site fortconsult.net

Whitepaper discussing site wide cross site scripting which is a technique to make injected code stay resident in the user's browser even after he leaves the vulnerable URL.

tags | paper, web, xss
MD5 | ad67d31aa24de158ec36b18cb15b58d5
Page 1 of 1
Back1Next

File Archive:

May 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    14 Files
  • 2
    May 2nd
    3 Files
  • 3
    May 3rd
    1 Files
  • 4
    May 4th
    18 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    21 Files
  • 7
    May 7th
    15 Files
  • 8
    May 8th
    19 Files
  • 9
    May 9th
    1 Files
  • 10
    May 10th
    2 Files
  • 11
    May 11th
    18 Files
  • 12
    May 12th
    39 Files
  • 13
    May 13th
    15 Files
  • 14
    May 14th
    17 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    2 Files
  • 17
    May 17th
    2 Files
  • 18
    May 18th
    15 Files
  • 19
    May 19th
    21 Files
  • 20
    May 20th
    15 Files
  • 21
    May 21st
    15 Files
  • 22
    May 22nd
    6 Files
  • 23
    May 23rd
    1 Files
  • 24
    May 24th
    1 Files
  • 25
    May 25th
    2 Files
  • 26
    May 26th
    23 Files
  • 27
    May 27th
    13 Files
  • 28
    May 28th
    18 Files
  • 29
    May 29th
    17 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close