accept no compromises
Showing 1 - 14 of 14 RSS Feed

Files Date: 2014-09-01

ManageEngine EventLog Analyzer 9.9 Authorization / Code Execution
Posted Sep 1, 2014
Authored by Hans-Martin Muench

ManageEngine EventLog Analyzer version 9.9 suffers from unauthenticated remote code execution via shell upload and authorization vulnerabilities.

tags | exploit, remote, shell, vulnerability, code execution
advisories | CVE-2014-6037
MD5 | 2e12bd3fff982ca523c7474c83e4595f
Avira License Application Cross Site Request Forgery
Posted Sep 1, 2014
Authored by Mazen Gamal | Site vulnerability-lab.com

An independent Vulnerability Laboratory Researcher discovered a cross site request forgery vulnerability in the official Avira license account system web-application.

tags | exploit, web, csrf
MD5 | b5fb5839b6e814ed2f03110f978b48b7
ICS-CERT Advisory - Schneider Electric Wonderware
Posted Sep 1, 2014
Authored by ICS-CERT | Site ics-cert.org

ICS-CERT Advisory 14-238-02 - Timur Yunusov, Ilya Karpov, Sergey Gordeychik, Alexey Osipov, and Dmitry Serebryannikov of the Positive Technologies Research Team have identified four vulnerabilities in the Schneider Electric Wonderware Information Server (WIS). Schneider Electric has produced an update that mitigates these vulnerabilities. Some of these vulnerabilities could be exploited remotely.

tags | advisory, vulnerability
advisories | CVE-2014-2380, CVE-2014-2381, CVE-2014-5397, CVE-2014-5398, CVE-2014-5399
MD5 | 2383565ae6a291f8b0eb74445c98e623
Subex ROC Fraud Management System 7.4 SQL Injection
Posted Sep 1, 2014
Authored by Anastasios Monachos

Subex ROC Fraud Management System version 7.4 suffers from a remote unauthenticated time-based blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 461c9518b316cfd8578e0e9e90c88330
ICIA2014 Call For Papers
Posted Sep 1, 2014
Site sdiwc.net

ICIA2014 will be held in Malaysia on October 8-10, 2014. The main objective of this conference is to provide a medium for professionals, engineers, academicians, scientists, and researchers from over the world to present the result of their research activities in the field of Computer Science, Engineering and Information Technology. ICIA2014 provides opportunities for the delegates to share the knowledge, ideas, innovations and problem solving techniques. Submitted papers will be reviewed by the technical program committee of the conference.

tags | paper, conference
MD5 | 554c4009afdd2189e620372733174ff6
Design And Implementation Of A Voice Encryption System For Telephone Networks
Posted Sep 1, 2014
Authored by Fabian Valero Duque

This whitepaper goes into detail on design and implementation details for performing voice encryption on telephone networks. Written in Spanish.

tags | paper, telephony
MD5 | 3f28d8fc39373c087a5feaa44d53835c
LeapFTP 3.1.0 URL Handling Buffer Overflow
Posted Sep 1, 2014
Authored by k3170makan

LeapFTP version 3.1.0 URL handling SEH buffer overflow exploit that spawns calc.exe.

tags | exploit, overflow
MD5 | b5e81c0ebc5fd6779b98d43b6c3719be
Sniggabo CMS 3.17 Cross Site Scripting
Posted Sep 1, 2014
Authored by KnocKout

Sniggabo CMS version 3.17 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 363d49efd03034776e8f6d6c99a49937
Outsmarted - Why Malware Works In Face Of Antivirus Software
Posted Sep 1, 2014
Authored by Daniel Sauder, Matthias Deeg, Sebastian Nerz

This whitepaper provides an analysis of why malware is so successful. For many years, different types of malware rank among the biggest IT security threats both in the business and the private domain. In order to protect one self from the dangers of malware, numerous software manufacturers offer IT security products like antivirus and endpoint protection software. But these products alone offer no sufficient protection from malware that knows some tricks, as the results of the author's recent research with the topic antivirus evasion show.

tags | paper, virus
MD5 | 14fbd9c17d4e94f92f7bdd75b0d1af6e
Arachni Web Application Scanner 0.4.7 Cross Site Scripting
Posted Sep 1, 2014
Authored by Prakhar Prasad

Arachni Web Application Scanner version 0.4.7 suffers from a persistent cross site scripting vulnerability.

tags | exploit, web, xss
MD5 | cb6f541feaa5e54df6d306060ce55b78
WordPress Multiple Themes Arbitrary File Download
Posted Sep 1, 2014
Authored by Hugo Santiago dos Santos

WordPress Ultimate, IncredibleWP, Ultimatum, Medicate, Centum, Avada, Striking, Beach, and CuckooTap Theme & eShop themes suffer from an arbitrary file download vulnerability. Note that this finding houses site-specific data.

tags | exploit, arbitrary
MD5 | 8c0d8ec98f9907c4b637ce0de1a603ed
Google Chrome 36.0 XSS Auditor Bypass
Posted Sep 1, 2014
Authored by Rafay Baloch

Google chrome XSS auditor was found prone to a bypass when the user input passed though location.hash was being written to the DOM by using document.write property. Normally, XSS auditor checks XSS by comparing the request and response however, it also checks for request itself, if it contains an untrusted input to prevent DOM XSS as well.

tags | exploit, bypass
MD5 | a0c3e8772d87250bb1744ca3f80e0613
Android Browser Same Origin Policy Bypass
Posted Sep 1, 2014
Authored by Rafay Baloch

A SOP bypass occurs when a sitea.com is some how able to access the properties of siteb.com such as cookies, location, response etc. Due to the nature of the issue and potential impact, this is very rarely found in modern browsers. However, they are found once in a while.

tags | exploit, bypass
MD5 | ad8c182335459c502276023ef6987e04
In-Portal CMS Cross Site Scripting
Posted Sep 1, 2014
Authored by MustLive

In-Portal CMS suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 29f3676759627e1771276f15b5150408
Page 1 of 1
Back1Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    28 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close