what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2014-09-01 to 2014-09-02

ManageEngine EventLog Analyzer 9.9 Authorization / Code Execution
Posted Sep 1, 2014
Authored by Hans-Martin Muench

ManageEngine EventLog Analyzer version 9.9 suffers from unauthenticated remote code execution via shell upload and authorization vulnerabilities.

tags | exploit, remote, shell, vulnerability, code execution
advisories | CVE-2014-6037
SHA-256 | a0c98cac5f5fd141c8b87fb1b8f63391779ddd21923531556150cd799b862ef7
Avira License Application Cross Site Request Forgery
Posted Sep 1, 2014
Authored by Mazen Gamal, Vulnerability Laboratory | Site vulnerability-lab.com

An independent Vulnerability Laboratory Researcher discovered a cross site request forgery vulnerability in the official Avira license account system web-application.

tags | exploit, web, csrf
SHA-256 | ab4176d2b30b9e05afdd30da7c3b895224608b39c04f1ce77d350aa5b6774188
ICS-CERT Advisory - Schneider Electric Wonderware
Posted Sep 1, 2014
Authored by ICS-CERT | Site ics-cert.org

ICS-CERT Advisory 14-238-02 - Timur Yunusov, Ilya Karpov, Sergey Gordeychik, Alexey Osipov, and Dmitry Serebryannikov of the Positive Technologies Research Team have identified four vulnerabilities in the Schneider Electric Wonderware Information Server (WIS). Schneider Electric has produced an update that mitigates these vulnerabilities. Some of these vulnerabilities could be exploited remotely.

tags | advisory, vulnerability
advisories | CVE-2014-2380, CVE-2014-2381, CVE-2014-5397, CVE-2014-5398, CVE-2014-5399
SHA-256 | e850a4bb6ae07055ff00878ae3e6e5133655aa4d07e4084a152cb16a2cd12e30
Subex ROC Fraud Management System 7.4 SQL Injection
Posted Sep 1, 2014
Authored by Anastasios Monachos

Subex ROC Fraud Management System version 7.4 suffers from a remote unauthenticated time-based blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 53886db4f0e6b216c908fa82111de7bddd4b4dd9b0139ce8fd7c6abaf4e02bbc
ICIA2014 Call For Papers
Posted Sep 1, 2014
Site sdiwc.net

ICIA2014 will be held in Malaysia on October 8-10, 2014. The main objective of this conference is to provide a medium for professionals, engineers, academicians, scientists, and researchers from over the world to present the result of their research activities in the field of Computer Science, Engineering and Information Technology. ICIA2014 provides opportunities for the delegates to share the knowledge, ideas, innovations and problem solving techniques. Submitted papers will be reviewed by the technical program committee of the conference.

tags | paper, conference
SHA-256 | 6ac89c400e8c3a9e671ab7d3c13272f0dcbd66ccba1b48822a10ca88620043e8
Design And Implementation Of A Voice Encryption System For Telephone Networks
Posted Sep 1, 2014
Authored by Fabian Valero Duque

This whitepaper goes into detail on design and implementation details for performing voice encryption on telephone networks. Written in Spanish.

tags | paper, telephony
SHA-256 | 96654408957024ded313fec057b5f79be73443423be062807bec0d5dffc0bf05
LeapFTP 3.1.0 URL Handling Buffer Overflow
Posted Sep 1, 2014
Authored by k3170makan

LeapFTP version 3.1.0 URL handling SEH buffer overflow exploit that spawns calc.exe.

tags | exploit, overflow
SHA-256 | 39a29201fceb706e13e2e41a07ee46ce9c3e7c6fd111a0d73e1c47b2198fb14d
Sniggabo CMS 3.17 Cross Site Scripting
Posted Sep 1, 2014
Authored by KnocKout

Sniggabo CMS version 3.17 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | d08eaf053576dff5b89e2f5b00c8c530a7e66a236f16ff7712d6a017779f47f8
Outsmarted - Why Malware Works In Face Of Antivirus Software
Posted Sep 1, 2014
Authored by Daniel Sauder, Matthias Deeg, Sebastian Nerz

This whitepaper provides an analysis of why malware is so successful. For many years, different types of malware rank among the biggest IT security threats both in the business and the private domain. In order to protect one self from the dangers of malware, numerous software manufacturers offer IT security products like antivirus and endpoint protection software. But these products alone offer no sufficient protection from malware that knows some tricks, as the results of the author's recent research with the topic antivirus evasion show.

tags | paper, virus
SHA-256 | dec9eff1124fd9cbaf98f478be5bc00a12adec280ae5425357c695fc475ac738
Arachni Web Application Scanner 0.4.7 Cross Site Scripting
Posted Sep 1, 2014
Authored by Prakhar Prasad

Arachni Web Application Scanner version 0.4.7 suffers from a persistent cross site scripting vulnerability.

tags | exploit, web, xss
SHA-256 | e72dde4bcfe334720ae988fd0e43af4ed94edb515423223e7bc2dcf2df9bcf28
WordPress Multiple Themes Arbitrary File Download
Posted Sep 1, 2014
Authored by Hugo Santiago dos Santos

WordPress Ultimate, IncredibleWP, Ultimatum, Medicate, Centum, Avada, Striking, Beach, and CuckooTap Theme & eShop themes suffer from an arbitrary file download vulnerability. Note that this finding houses site-specific data.

tags | exploit, arbitrary
SHA-256 | bf222a16897642cbc16ceccceb7f65a592eac26d57d3fccb76735f024300c150
Google Chrome 36.0 XSS Auditor Bypass
Posted Sep 1, 2014
Authored by Rafay Baloch

Google chrome XSS auditor was found prone to a bypass when the user input passed though location.hash was being written to the DOM by using document.write property. Normally, XSS auditor checks XSS by comparing the request and response however, it also checks for request itself, if it contains an untrusted input to prevent DOM XSS as well.

tags | exploit, bypass
SHA-256 | 1726b972e5f7b81516b54d146c54fb1608b841f8ba39f275b51934e65215d5cd
Android Browser Same Origin Policy Bypass
Posted Sep 1, 2014
Authored by Rafay Baloch

A SOP bypass occurs when a sitea.com is some how able to access the properties of siteb.com such as cookies, location, response etc. Due to the nature of the issue and potential impact, this is very rarely found in modern browsers. However, they are found once in a while.

tags | exploit, bypass
SHA-256 | b5c1e22000f4ed24662d0911996baf893391c569633c0cd44a70ed8a1525e169
In-Portal CMS Cross Site Scripting
Posted Sep 1, 2014
Authored by MustLive

In-Portal CMS suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | dc10b7f0aeb4945e6ca1d98f043f3b423396541316af2d55a637765311966a11
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close