exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

SE-2012-01 Technical Report
Posted Nov 16, 2012
Authored by Adam Gowdiak | Site security-explorations.com

This is the technical report detailing the Oracle Java vulnerabilities originally noted in SE-2012-01.

tags | paper, java, vulnerability
SHA-256 | d00c5da4cf880cde2e84ea74745b16dbc8e7132738d0d05fc29c596259008c0d

Related Files

Seagate BlackArmor NAS sg2000-2000.1331 Command Injection
Posted Jul 16, 2021
Authored by Metin Yunus Kandemir

Seagate BlackArmor NAS version sg2000-2000.1331 remote command injection exploit.

tags | exploit, remote
SHA-256 | 9a7285a69805f1136bd7054963d9148897967e805a6a67a1cd1ffbf3c3dc7172
School Event Attendance Monitoring System 1.0 Cross Site Scripting
Posted Feb 12, 2021
Authored by Suresh Kumar

School Event Attendance Monitoring System version 1.0 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | f24ea62864f99168db534533d904e718eec3104b5d031e784df47f70a33c8549
Seacms 11.1 Cross Site Scripting
Posted Dec 13, 2020
Authored by j5s

Seacms version 11.1 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 35dc5414d3512be6043fbc4971d90695d4fb0bdbc365b5089931b9e2c2e3ca34
Seacms 11.1 Local File Inclusion
Posted Dec 12, 2020
Authored by j5s

Seacms version 11.1 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 42f308848eea10bd63b353933f6f2d4f0164f9e0439cbcbbae0e052baaa80db6
Seacms 11.1 Remote Command Execution
Posted Dec 12, 2020
Authored by j5s

Seacms version 11.1 suffers from a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | a50aa9d756c5893f75333e0fee074bbaec1d3742b828e96cb3cbd60e989a5bd6
Seabreeze Consulting Cross Site Scripting
Posted Apr 3, 2020
Authored by thelastvvv

Seabreeze Consulting version 1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 1f3325442680aaec6251278da0daba2e54dbbde77fbdcd6c9e7b6855e46754ab
Java Card Proof Of Concepts
Posted Jun 14, 2019
Authored by Adam Gowdiak | Site security-explorations.com

Security Explorations has discovered multiple security vulnerabilities in the reference implementation of Java Card technology from Oracle used in financial, government, transportation and telecommunication sectors among others. As for the impact, the vulnerabilities found make it possible to break memory safety of the underlying Java Card VM. As a result, full access to smartcard memory could be achieved, applet firewall could be broken or native code execution could be gained. This archive contains the proof of concept code that demonstrates these vulnerabilities which were originally made public in March of 2019.

tags | exploit, java, vulnerability, code execution, proof of concept
SHA-256 | 22ac20b59483601b9077fb4862bb70d8f034648a969c478415328a8d85326aca
Gemalto Java Card SE-2019-01 Issue 34
Posted Jun 14, 2019
Authored by Adam Gowdiak | Site security-explorations.com

This is the second of two extensive reports sent to Gemalto by Security Explorations to document vulnerabilities found in Java Card. Issue 34 is documented in this report.

tags | advisory, java, vulnerability
SHA-256 | 67d6d552ce4c167529c7cd84de0d0be125a4bdc6728dcd0cc31fb219c9d4011d
Gemalto Java Card SE-2019-01 Issues 19 And 33
Posted Jun 14, 2019
Authored by Adam Gowdiak | Site security-explorations.com

This is the first of two extensive reports sent to Gemalto by Security Explorations to document vulnerabilities found in Java Card. Issues 19 and 33 are in this report.

tags | advisory, java, vulnerability
SHA-256 | 32aca3def4a46b63b9c8e018bba1b57b074ab1a278951e26deaa861e0b140b14
Oracle Java Card SE-2019-01 Issues 26-32
Posted Jun 14, 2019
Authored by Adam Gowdiak | Site security-explorations.com

This is the third of three extensive reports sent to Oracle by Security Explorations to document vulnerabilities found in Java Card. Issues 26 through 32 are in this report.

tags | advisory, java, vulnerability
SHA-256 | 8d2b759c1b5a470b8d80314d6c5b026ab6eb6c87410e6af99040f73abe993b0f
Oracle Java Card SE-2019-01 Issues 20-25
Posted Jun 14, 2019
Authored by Adam Gowdiak | Site security-explorations.com

This is the second of three extensive reports sent to Oracle by Security Explorations to document vulnerabilities found in Java Card. Issues 20 through 25 are in this report.

tags | advisory, java, vulnerability
SHA-256 | 223a793bc15195c628f17c4fc553a3c603a66dd2a1b8dff8b24e298ddc831464
Oracle Java Card SE-2019-01 Issues 1-18
Posted Jun 14, 2019
Authored by Adam Gowdiak | Site security-explorations.com

This is the first of three extensive reports sent to Oracle by Security Explorations to document vulnerabilities found in Java Card. Issues 1 through 18 are in this report.

tags | advisory, java, vulnerability
SHA-256 | 6c524db6b0b45d01b1e715bfb97219d0ab2f4adb4b4e678d3b24918baa34d69e
Java Card VM Memory Safety
Posted Mar 20, 2019
Authored by Adam Gowdiak | Site security-explorations.com

Security Explorations has discovered multiple security vulnerabilities in the reference implementation of Java Card technology from Oracle used in financial, government, transportation and telecommunication sectors among others. As for the impact, the vulnerabilities found make it possible to break memory safety of the underlying Java Card VM. As a result, full access to smartcard memory could be achieved, applet firewall could be broken or native code execution could be gained.

tags | advisory, java, vulnerability, code execution
SHA-256 | 13a1c021f386ea8562db371d87447e51b75f82035a8868806f76394eb2c78f11
Seagate Personal Cloud SRN21C SQL Injection
Posted Aug 24, 2018
Authored by Yorick Koster

Seagate Personal Cloud model SRN21C running firmware versions 4.3.16.0 and 4.3.18.0 suffer from remote SQL injection vulnerabilities in the media server.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | e778b88faf6c13b9ded2dc0b1c5a4d719131745dd2f652b92a0899ab6d72d2b9
SearchBlox 8.6.7 XML External Entity Injection
Posted Jun 4, 2018
Authored by Canberk BOLAT, Ahmet Gurel

SearchBlox version 8.6.7 suffers from an XML external entity injection vulnerability.

tags | exploit
advisories | CVE-2018-11586
SHA-256 | 5cfa4db51ca79b891f9ff37b4d1c2513f445a1b9f2be8b8903b97a54e4983414
SearchBlox 8.6.6 Cross Site Request Forgery
Posted May 30, 2018
Authored by Canberk BOLAT, Ahmet Gurel

SearchBlox version 8.6.6 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2018-11538
SHA-256 | 25278c33e75a22e31d96f8b4e5718da4dbacdb00597fb469fef40a4f0f09c1d9
The Origin And Impact Of Security Vulnerabilities In ST Chipsets
Posted Apr 21, 2018
Site security-explorations.com

This whitepaper explores the origin and impact of the vulnerabilities discovered in ST chipsets.

tags | paper, vulnerability
SHA-256 | 43e3f8317f8b138cdcd0529baa9770438b7cca42407128e39c63e9b17552ce46
Seagate Media Server SRN21C Cross Site Scripting
Posted Apr 19, 2018
Authored by Yorick Koster

Seagate Personal Cloud model SRN21C running firmware versions 4.3.16.0 and 4.3.18.0 suffers from a persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | e781553767030bf98f0d576bce042a246fa79981a84c0cfb754a87a6669dfce7
Seagate Media Server Path Traversal
Posted Apr 19, 2018
Authored by Yorick Koster

Seagate Personal Cloud model SRN21C running firmware versions 4.3.16.0 and 4.3.18.0 suffer from a path traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 5ef896e7b37cb5ccba017088977b813090cb4b99b1764b4ea351316ab3dd7a44
Seagate Personal Cloud SRN21C Arbitrary File Move
Posted Apr 19, 2018
Authored by Yorick Koster

Seagate Personal Cloud model SRN21C running firmware versions 4.3.16.0 and 4.3.18.0 allows for moving of arbitrary files.

tags | exploit, arbitrary
SHA-256 | c10b30b886d514c80a6e95c583657ad577f538056af82102f47d7c966c1721fd
Seagate Personal Cloud Command Injection
Posted Jan 16, 2018
Authored by Yorick Koster

Seagate Personal Cloud suffers from multiple command injection vulnerabilities.

tags | exploit, vulnerability
advisories | CVE-2018-5347
SHA-256 | 2a336eda64120c4d115233d9b3f5e7d5b8d216683a2d574817c4246464990a07
Seagate Media Server Arbitrary File / Folder Deletion
Posted Jan 15, 2018
Authored by Yorick Koster, Securify B.V.

Seagate Media Server on a Seagate Personal Cloud model SRN21C running firmware version 4.3.16.0 suffers from an unauthenticated arbitrary file and folder deletion vulnerability.

tags | exploit, arbitrary
SHA-256 | f3f389a36fe31dac25043a5e92d7942a029fddff9e00419ed4f652efc9e5e14c
IBM Java Issue 70 Bad Patch
Posted Apr 12, 2016
Authored by Adam Gowdiak | Site security-explorations.com

The patch for Issue 70 in IBM Java discovered by Security Explorations in 2013 was found to be faulty. Included are the full report and a proof of concept.

tags | exploit, java, proof of concept
systems | linux
advisories | CVE-2013-5456
SHA-256 | 24180117b921605ffa337bfcd62c889bf47a2e79be4fd3593f12c7031b1258ce
IBM Java Issue 67 Bad Patch
Posted Apr 5, 2016
Authored by Adam Gowdiak | Site security-explorations.com

The patch for Issue 67 in IBM Java discovered by Security Explorations in 2013 was found to be faulty.

tags | advisory, java
SHA-256 | 05acd35224d6d36ec0c881a14c2437781d3cf225c1d917f2a38924f23726bf48
Oracle Java Security Fix Bypass
Posted Mar 11, 2016
Authored by Adam Gowdiak | Site security-explorations.com

Security Explorations has released details and a proof of concept to bypass a broken security fix found in the Oracle Java SE fix from September, 2013.

tags | exploit, java, proof of concept
systems | linux
advisories | CVE-2013-5838
SHA-256 | 01bc25f8f8df246c49b97afca9f4177773fc93680f8d029f118b41c573555d1f
Page 1 of 4
Back1234Next

File Archive:

September 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    2 Files
  • 2
    Sep 2nd
    21 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    17 Files
  • 5
    Sep 5th
    34 Files
  • 6
    Sep 6th
    29 Files
  • 7
    Sep 7th
    11 Files
  • 8
    Sep 8th
    25 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    26 Files
  • 12
    Sep 12th
    23 Files
  • 13
    Sep 13th
    17 Files
  • 14
    Sep 14th
    22 Files
  • 15
    Sep 15th
    16 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    19 Files
  • 19
    Sep 19th
    60 Files
  • 20
    Sep 20th
    23 Files
  • 21
    Sep 21st
    15 Files
  • 22
    Sep 22nd
    8 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close