what you don't know can hurt you
Showing 1 - 9 of 9 RSS Feed

Files

ObjectPlanet Opinio 7.13 / 7.14 XML Injection
Posted Jul 30, 2021
Authored by Daniel Tan, Khor Yong Heng, Timothy Tan, Yu Enhui

ObjectPlanet Opinio versions 7.13 and 7.14 suffer from an XML external entity injection vulnerability.

tags | exploit
advisories | CVE-2020-26564
MD5 | 42b0801a736a8c5f0e5d56cd04363a4e

Related Files

ObjectPlanet Opinio 7.13 Shell Upload
Posted Jul 30, 2021
Authored by Daniel Tan, Khor Yong Heng, Timothy Tan, Yu Enhui

ObjectPlanet Opinio version 7.13 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
advisories | CVE-2020-26806
MD5 | 428a660ba8fcf617d5de88b7920acbe4
ObjectPlanet Opinio 7.13 Expression Language Injection
Posted Jul 30, 2021
Authored by Daniel Tan, Khor Yong Heng, Timothy Tan, Yu Enhui

ObjectPlanet Opinio version 7.13 suffers from an expression language injection vulnerability.

tags | exploit
advisories | CVE-2020-26565
MD5 | e4ac02c7c40ce27bf82fc181349ac136
ObjectPlanet Opinio 7.12 Cross Site Scripting
Posted Jul 29, 2021
Authored by Ang Kar Min

ObjectPlanet Opinio version 7.12 suffers from reflective and persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2020-26563
MD5 | 2baf2d582b70bc71d82c7d5d66558dd6
ACM CCS 2019 Call For Papers
Posted Nov 20, 2018
Site ccs2019.sigsac.org

The 26th ACM Conference on Computer and Communications Security will take place in London, UK, November 11th through the 15th, 2019. The Conference on Computer and Communications Security (CCS) seeks submissions presenting novel contributions related to all real-world aspects of computer security and privacy. Theoretical papers must make a convincing case for the relevance of their results to practice. Authors are encouraged to write the abstract and introduction of their paper in a way that makes the results accessible and compelling to a general computer-security researcher. In particular, authors should bear in mind that anyone on the program committee may be asked to give an opinion about any paper.

tags | paper, conference
MD5 | a24c626f168ab9d55ba065750ed9dbce
ObjectPlanet Opinio 7.6.3 Cross Site Scripting
Posted Jul 12, 2017
Authored by Kasper Karlsson

ObjectPlanet Opinio versions 7.6.3 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2017-10798
MD5 | 2c6e538a5255abbbe63a715b422d9339
unt-gov1.zip
Posted Aug 26, 2002

__________________________________ .---\__ _ / \_____ _\__ _ ____/------. |::::/ / / / \_/ \_:::uNt::| |:::/____ /____/ /____ /pREsEntS| +-------\____/-----\____/----\____/---------+ |::::Opinion Text On The U.S. Government::::| '-------------------------------------------'

tags | bbs
MD5 | 13770b6484b2b56da0e2442968ed0b0b
raccess-0.7.tar.gz
Posted May 24, 2002
Authored by Angel Ramos | Site salix.org

"Remote Access Session" is a security tool to analyze the integrity of systems. The program tries to gain access to a system using the most advanced techniques of remote intrusion. It can either work in normal mode (which is fast) or hard mode (which is more intensive). There is a big difference between "Remote Access Session" and other remote security audit tools as "Nessus" or "Internet Scanner" - If "Remote Access Session" finds a remote vulnerability that gives a user account or root, it will try to exploit it and it will return a shell. In my honest opinion, this is the only way to discard false positives of remote vulnerabilities, and the only way to demonstrate that the danger is real to upper management. "Remote Access Session" is not a hacker tool. It has been designed for system administrators and security engineers, and does not attempt any kind of stealth.

Changes: Ported to BSD and Solaris, added network scanning mode, improved performance, and ported some of the exploits.
tags | tool, remote, shell, root, scanner, vulnerability
systems | unix
MD5 | 5a75bb361001d7e294eebbb5b363ad41
raccess-0.6.tar.gz
Posted Jan 12, 2002
Authored by Angel Ramos | Site salix.org

"Remote Access Session" is a security tool to analyze the integrity of systems. The program tries to gain access to a system using the most advanced techniques of remote intrusion. It can either work in normal mode (which is fast) or hard mode (which is more intensive). There is a big difference between "Remote Access Session" and other remote security audit tools as "Nessus" or "Internet Scanner" - If "Remote Access Session" finds a remote vulnerability that gives a user account or root, it will try to exploit it and it will return a shell. In my honest opinion, this is the only way to discard false positives of remote vulnerabilities, and the only way to demonstrate that the danger is real to upper management. "Remote Access Session" is not a hacker tool. It has been designed for system administrators and security engineers, and does not attempt any kind of stealth.

tags | tool, remote, shell, root, scanner, vulnerability
systems | unix
MD5 | 8d045a0b336f0cd635c4ab788d2872da
hackers_can_be_outdated.html
Posted Aug 17, 1999
Authored by Guillaume Laurent

"Being a hacker doesn't protect you from being outdated" - An opinionated, but very interesting and insightful, article about the "facts" and "causes" related to "hackers becoming outdated".

tags | paper
MD5 | 2a6b271c7f763494032fba9a99f61540
Page 1 of 1
Back1Next

File Archive:

October 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    16 Files
  • 2
    Oct 2nd
    1 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    24 Files
  • 5
    Oct 5th
    24 Files
  • 6
    Oct 6th
    11 Files
  • 7
    Oct 7th
    14 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    1 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    7 Files
  • 12
    Oct 12th
    15 Files
  • 13
    Oct 13th
    26 Files
  • 14
    Oct 14th
    10 Files
  • 15
    Oct 15th
    6 Files
  • 16
    Oct 16th
    2 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    14 Files
  • 19
    Oct 19th
    15 Files
  • 20
    Oct 20th
    20 Files
  • 21
    Oct 21st
    12 Files
  • 22
    Oct 22nd
    14 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close