exploit the possibilities
Showing 1 - 7 of 7 RSS Feed

Files from Georg Ph E Heise

First Active2020-03-28
Last Active2020-12-18
Programi Bilanc Build 007 Release 014 31.01.2020 SQL Injection
Posted Dec 18, 2020
Authored by Georg Ph E Heise

Programi Bilanc build 007 release 014 31.01.2020 suffers from multiple remote SQL injection vulnerabilities.

tags | advisory, remote, vulnerability, sql injection
advisories | CVE-2020-11717
MD5 | 0f84f21e3beafbe18dfb7c4f53021779
Programi Bilanc Build 007 Release 014 31.01.2020 Insecure Downloads
Posted Dec 18, 2020
Authored by Georg Ph E Heise

Programi Bilanc build 007 release 014 31.01.2020 downloads software updates via unencrypted channels and allows attackers to manipulate this process.

tags | advisory
advisories | CVE-2020-11718
MD5 | 617bb4817a1e28d9c574bcafe1dc6989
Programi Bilanc Build 007 Release 014 31.01.2020 Hardcoded Credentials
Posted Dec 18, 2020
Authored by Georg Ph E Heise

Programi Bilanc build 007 release 014 31.01.2020 supplies an .exe file containing several hardcoded credentials to different servers that allow remote attackers to gain access to the complete infrastructure including the website, update server, and external issue tracking tools.

tags | advisory, remote
advisories | CVE-2020-8995
MD5 | 391599f66b9489a0327befd62c653dd2
Programi Bilanc Build 007 Release 014 31.01.2020 Static Key
Posted Dec 18, 2020
Authored by Georg Ph E Heise

Programi Bilanc build 007 release 014 31.01.2020 leaves a static key in source code that any attacker can leverage to decrypt data.

tags | advisory
advisories | CVE-2020-11719
MD5 | a98bc915131fce470d7cfd4887b16d83
Programi Bilanc Build 007 Release 014 31.01.2020 Weak Default Password
Posted Dec 18, 2020
Authored by Georg Ph E Heise

Programi Bilanc build 007 release 014 31.01.2020 uses a weak default password.

tags | advisory
advisories | CVE-2020-11720
MD5 | 58fc04489ea61effe668394ab75d4480
Matrix42 Workspace Management 9.1.2.2765 Cross Site Scripting
Posted Apr 15, 2020
Authored by Christian Pappas, Georg Ph E Heise

Matrix42 Workspace Management version 9.1.2.2765 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2019-19500
MD5 | d7622e1b5af76e87a0ba3b19190d51a8
codeBeamer 9.5 Cross Site Scripting
Posted Mar 28, 2020
Authored by Georg Ph E Heise

codeBeamer versions 9.5 and below suffer from multiple persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2019-19912, CVE-2019-19913
MD5 | f0eca9618f504c287a0819470ab7990f
Page 1 of 1
Back1Next

File Archive:

February 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    33 Files
  • 2
    Feb 2nd
    30 Files
  • 3
    Feb 3rd
    15 Files
  • 4
    Feb 4th
    8 Files
  • 5
    Feb 5th
    11 Files
  • 6
    Feb 6th
    2 Files
  • 7
    Feb 7th
    1 Files
  • 8
    Feb 8th
    37 Files
  • 9
    Feb 9th
    15 Files
  • 10
    Feb 10th
    11 Files
  • 11
    Feb 11th
    26 Files
  • 12
    Feb 12th
    8 Files
  • 13
    Feb 13th
    1 Files
  • 14
    Feb 14th
    1 Files
  • 15
    Feb 15th
    9 Files
  • 16
    Feb 16th
    33 Files
  • 17
    Feb 17th
    6 Files
  • 18
    Feb 18th
    10 Files
  • 19
    Feb 19th
    20 Files
  • 20
    Feb 20th
    1 Files
  • 21
    Feb 21st
    1 Files
  • 22
    Feb 22nd
    17 Files
  • 23
    Feb 23rd
    15 Files
  • 24
    Feb 24th
    16 Files
  • 25
    Feb 25th
    28 Files
  • 26
    Feb 26th
    25 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close