Twenty Year Anniversary
Showing 1 - 14 of 14 RSS Feed

Files Date: 2014-09-01

ManageEngine EventLog Analyzer 9.9 Authorization / Code Execution
Posted Sep 1, 2014
Authored by Hans-Martin Muench

ManageEngine EventLog Analyzer version 9.9 suffers from unauthenticated remote code execution via shell upload and authorization vulnerabilities.

tags | exploit, remote, shell, vulnerability, code execution
advisories | CVE-2014-6037
MD5 | 2e12bd3fff982ca523c7474c83e4595f
Avira License Application Cross Site Request Forgery
Posted Sep 1, 2014
Authored by Mazen Gamal | Site

An independent Vulnerability Laboratory Researcher discovered a cross site request forgery vulnerability in the official Avira license account system web-application.

tags | exploit, web, csrf
MD5 | b5fb5839b6e814ed2f03110f978b48b7
ICS-CERT Advisory - Schneider Electric Wonderware
Posted Sep 1, 2014
Authored by ICS-CERT | Site

ICS-CERT Advisory 14-238-02 - Timur Yunusov, Ilya Karpov, Sergey Gordeychik, Alexey Osipov, and Dmitry Serebryannikov of the Positive Technologies Research Team have identified four vulnerabilities in the Schneider Electric Wonderware Information Server (WIS). Schneider Electric has produced an update that mitigates these vulnerabilities. Some of these vulnerabilities could be exploited remotely.

tags | advisory, vulnerability
advisories | CVE-2014-2380, CVE-2014-2381, CVE-2014-5397, CVE-2014-5398, CVE-2014-5399
MD5 | 2383565ae6a291f8b0eb74445c98e623
Subex ROC Fraud Management System 7.4 SQL Injection
Posted Sep 1, 2014
Authored by Anastasios Monachos

Subex ROC Fraud Management System version 7.4 suffers from a remote unauthenticated time-based blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 461c9518b316cfd8578e0e9e90c88330
ICIA2014 Call For Papers
Posted Sep 1, 2014

ICIA2014 will be held in Malaysia on October 8-10, 2014. The main objective of this conference is to provide a medium for professionals, engineers, academicians, scientists, and researchers from over the world to present the result of their research activities in the field of Computer Science, Engineering and Information Technology. ICIA2014 provides opportunities for the delegates to share the knowledge, ideas, innovations and problem solving techniques. Submitted papers will be reviewed by the technical program committee of the conference.

tags | paper, conference
MD5 | 554c4009afdd2189e620372733174ff6
Design And Implementation Of A Voice Encryption System For Telephone Networks
Posted Sep 1, 2014
Authored by Fabian Valero Duque

This whitepaper goes into detail on design and implementation details for performing voice encryption on telephone networks. Written in Spanish.

tags | paper, telephony
MD5 | 3f28d8fc39373c087a5feaa44d53835c
LeapFTP 3.1.0 URL Handling Buffer Overflow
Posted Sep 1, 2014
Authored by k3170makan

LeapFTP version 3.1.0 URL handling SEH buffer overflow exploit that spawns calc.exe.

tags | exploit, overflow
MD5 | b5e81c0ebc5fd6779b98d43b6c3719be
Sniggabo CMS 3.17 Cross Site Scripting
Posted Sep 1, 2014
Authored by KnocKout

Sniggabo CMS version 3.17 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 363d49efd03034776e8f6d6c99a49937
Outsmarted - Why Malware Works In Face Of Antivirus Software
Posted Sep 1, 2014
Authored by Daniel Sauder, Matthias Deeg, Sebastian Nerz

This whitepaper provides an analysis of why malware is so successful. For many years, different types of malware rank among the biggest IT security threats both in the business and the private domain. In order to protect one self from the dangers of malware, numerous software manufacturers offer IT security products like antivirus and endpoint protection software. But these products alone offer no sufficient protection from malware that knows some tricks, as the results of the author's recent research with the topic antivirus evasion show.

tags | paper, virus
MD5 | 14fbd9c17d4e94f92f7bdd75b0d1af6e
Arachni Web Application Scanner 0.4.7 Cross Site Scripting
Posted Sep 1, 2014
Authored by Prakhar Prasad

Arachni Web Application Scanner version 0.4.7 suffers from a persistent cross site scripting vulnerability.

tags | exploit, web, xss
MD5 | cb6f541feaa5e54df6d306060ce55b78
WordPress Multiple Themes Arbitrary File Download
Posted Sep 1, 2014
Authored by Hugo Santiago dos Santos

WordPress Ultimate, IncredibleWP, Ultimatum, Medicate, Centum, Avada, Striking, Beach, and CuckooTap Theme & eShop themes suffer from an arbitrary file download vulnerability. Note that this finding houses site-specific data.

tags | exploit, arbitrary
MD5 | 8c0d8ec98f9907c4b637ce0de1a603ed
Google Chrome 36.0 XSS Auditor Bypass
Posted Sep 1, 2014
Authored by Rafay Baloch

Google chrome XSS auditor was found prone to a bypass when the user input passed though location.hash was being written to the DOM by using document.write property. Normally, XSS auditor checks XSS by comparing the request and response however, it also checks for request itself, if it contains an untrusted input to prevent DOM XSS as well.

tags | exploit, bypass
MD5 | a0c3e8772d87250bb1744ca3f80e0613
Android Browser Same Origin Policy Bypass
Posted Sep 1, 2014
Authored by Rafay Baloch

A SOP bypass occurs when a is some how able to access the properties of such as cookies, location, response etc. Due to the nature of the issue and potential impact, this is very rarely found in modern browsers. However, they are found once in a while.

tags | exploit, bypass
MD5 | ad8c182335459c502276023ef6987e04
In-Portal CMS Cross Site Scripting
Posted Sep 1, 2014
Authored by MustLive

In-Portal CMS suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 29f3676759627e1771276f15b5150408
Page 1 of 1

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

May 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    15 Files
  • 2
    May 2nd
    17 Files
  • 3
    May 3rd
    30 Files
  • 4
    May 4th
    29 Files
  • 5
    May 5th
    2 Files
  • 6
    May 6th
    3 Files
  • 7
    May 7th
    13 Files
  • 8
    May 8th
    27 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    15 Files
  • 11
    May 11th
    8 Files
  • 12
    May 12th
    2 Files
  • 13
    May 13th
    8 Files
  • 14
    May 14th
    7 Files
  • 15
    May 15th
    43 Files
  • 16
    May 16th
    19 Files
  • 17
    May 17th
    16 Files
  • 18
    May 18th
    15 Files
  • 19
    May 19th
    3 Files
  • 20
    May 20th
    7 Files
  • 21
    May 21st
    15 Files
  • 22
    May 22nd
    40 Files
  • 23
    May 23rd
    61 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By