what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Simon Bieber

Email addresssbieber at secuvera.de
First Active2013-04-03
Last Active2021-06-11
NetSetManPro 4.7.2 Privilege Escalation
Posted Jun 11, 2021
Authored by Simon Bieber

NetSetManPro version 4.7.2 suffers from a privilege escalation vulnerability.

tags | exploit
advisories | CVE-2021-34546
SHA-256 | e8a3f23fc7f163c05873cbfb945bc19268910c026e3331a239742efa41af0936
Streamworks Job Scheduler Release 7 Authentication Weakness
Posted Jan 16, 2019
Authored by Simon Bieber

Streamworks Job Scheduler Release 7 has all agents using the same X.509 certificates and keys issued by the vendor for authentication. The processing server component does not check received messages properly for authenticity. Agents installed on servers do not check received messages properly for authenticity. Agents and processing servers are vulnerable to the TLS Heartbleed attack.

tags | exploit
advisories | CVE-2014-0160
SHA-256 | 8d3ab2a2e1407bcba852d7925fccb15e6610ced1db687ba89dc4e1333028ea6d
OCS Inventory NG ocsreports 2.4 / 2.3.1 SQL Injection
Posted Apr 10, 2018
Authored by Simon Bieber

OCS Inventory NG ocsreports versions 2.4 and 2.3.1 suffer from remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | e7fc54d755c00801636a6217329e667a3c538290ff2ad25a1fe2d5f5a446d2f5
OCS Inventory NG ocsreports 2.4 Cross Site Scripting
Posted Apr 10, 2018
Authored by Simon Bieber

OCS Inventory NG ocsreports version 2.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 927f922342cae04cf72a1791db35f1d83533db1be55191b9a64f59848621cba9
OPSI Managed Client Remote Command Execution
Posted Jan 31, 2017
Authored by Simon Bieber

A remote attacker with knowledge of a single machine name and the corresponding OPSI machine key is able to execute arbitrary commands on any OPSI Managed client in the same managed environment by using the Remote Procedure Call (RPC) Interface of the OPSI-Server. The attacker is able to use the SYSTEM privileges of the OPSI Agent on any managed client computer and execute arbitrary commands leading to an elevation of privileges. Affected includes OPSI Server version 4.0.7.26 and OPSI ClientAgent version 4.0.7.10-1.

tags | exploit, remote, arbitrary
SHA-256 | 444597f83e9e0ad48a430a35373f0bc6a018226b622b3ff1e949820391597d37
e107 CMS 1.0.2 Cross Site Scripting
Posted Apr 3, 2013
Authored by Simon Bieber

e107 CMS version 1.0.2 suffers from a reflective cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2013-2750
SHA-256 | b0a7d7d19b1bf2785fccdbdb0f2175d28946b402c3fbfdcc3590de48c18ffc57
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    0 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close