exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files

Enomaly ECP/Enomalism Insecure File Creation
Posted Jan 30, 2009
Authored by Sam Johnston

Enomaly ECP/Enomalism versions prior to 2.1.1 use temporary files in an insecure manner, allowing for symlink and command injection attacks.

tags | exploit
advisories | CVE-2008-4990
SHA-256 | c2f83d754ab9d6bdb0af2e41fc5bf6c46034f1807d705f25738a759685b5720d

Related Files

Secunia Security Advisory 38589
Posted Feb 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sam Johnston has reported some security issues in Enomaly ECP Community Edition, which can be exploited by malicious people to bypass certain security restrictions and compromise a vulnerable system.

tags | advisory
SHA-256 | 43f6e61881222e55b8ed4aa3c08712b066e6223b1bc071e64642f87b43f8bba1
Enomaly ECP 3.0.4 Insecure Silent Update Mechanism
Posted Feb 16, 2010
Authored by Sam Johnston

Enomaly ECP versions up to and including 3.0.4 are believed to contain an insecure silent update mechanism that could allow a remote attacker to execute arbitrary code as root, and to inject or modify VM workloads for execution within user environment or to replay older, insecure workloads. Both the Enomaly ECP implementation and the VMcasting protocol itself are believed to be vulnerable.

tags | advisory, remote, arbitrary, root, protocol
SHA-256 | e16285c2f1ba9ebc8fd42584526dc51cf5c5ff2063e048b6d25545b604a2ead0
Secunia Security Advisory 33952
Posted Feb 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sam Johnston has reported a security issue in Enomaly ECP, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | b6fd3dfd727d32d52794062ca63fd0f7614875ec8425ea6a05ac72738c2cf99b
Enomaly ECP/Enomalism enomalism2.sh Temporary Files
Posted Feb 16, 2009
Authored by Sam Johnston

All versions of Enomaly ECP/Enomalism before 2.2.1 have multiple issues relating to the use of temporary files in an insecure manner.

tags | exploit
advisories | CVE-2008-4990, CVE-2009-0390
SHA-256 | 461388d5af9b086c1ea7698c7c71be0f51f4b95fd1d2fce9bd1ff0fe15f9f6d3
Enomaly ECP/Enomalism Code Execution
Posted Feb 13, 2009
Authored by Sam Johnston

All versions of Enomaly ECP/Enomalism have an insecure silent update mechanism that could allow a remote attacker to execute arbitrary code as root.

tags | advisory, remote, arbitrary, root
SHA-256 | 9f314c7d809a33fd1f2f922ca6d89e8825901419404addfcf7d0d5e4c2e48bca
Secunia Security Advisory 33724
Posted Feb 2, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Enomaly ECP, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
SHA-256 | c9ae97de3a30444e26c428487095bb7e1dab57e3224cf850a0ed945cf02bb28d
Page 1 of 1
Back1Next

File Archive:

November 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    1 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    0 Files
  • 5
    Nov 5th
    0 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    219 Files
  • 14
    Nov 14th
    19 Files
  • 15
    Nov 15th
    66 Files
  • 16
    Nov 16th
    38 Files
  • 17
    Nov 17th
    9 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    11 Files
  • 22
    Nov 22nd
    56 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    36 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    14 Files
  • 28
    Nov 28th
    30 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close