what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files from Sebastian Muniz

First Active2007-11-28
Last Active2014-03-26
Allied Telesis AT-RG634A Unauthenticated Webshell
Posted Mar 26, 2014
Authored by Sebastian Muniz

Allied Telesis AT-RG634A ADSL broadband router has hidden administrative unauthenticated webshell that allows for command injection.

tags | exploit
advisories | CVE-2014-1982
SHA-256 | e3656907ce60bc967c703eead969f7f9b2ab164514e55b51d9246f8a9fad51ca
Core Security Technologies Advisory 2008.0125
Posted Jun 11, 2008
Authored by Core Security Technologies, Sebastian Muniz | Site coresecurity.com

Core Security Technologies Advisory - A vulnerability was found in CitectSCADA that could allow a remote un-authenticated attacker to force an abnormal termination of the vulnerable software (Denial of Service) or to execute arbitrary code on vulnerable systems to gain complete control of the software. To accomplish such goal the would-be attacker must be able to connect to the vulnerable service on a TCP high-port.

tags | advisory, remote, denial of service, arbitrary, tcp
advisories | CVE-2008-2639
SHA-256 | 19bd45b897c6982edbb11d71c9c88e4b43443d02180be90c94917a52bf3de427
Core Security Technologies Advisory 2008.0415
Posted May 20, 2008
Authored by Core Security Technologies, Sebastian Muniz | Site coresecurity.com

Core Security Technologies Advisory - The Borland Interbase 2007 database server is vulnerable to an integer overflow when a malformed packet is sent to the default TCP port 3050. The integer overflow can cause a stack overflow, which allows arbitrary code execution with system privileges. Service pack 2 (0.1.0.256) on Solaris and Windows are both vulnerable.

tags | advisory, overflow, arbitrary, tcp, code execution
systems | windows, solaris
advisories | CVE-2008-0467
SHA-256 | 162a64117efd8eb84f7236e3d10643be16aefc4e640167283fec90fcd738ad1a
Core Security Technologies Advisory 2008.0129
Posted May 6, 2008
Authored by Core Security Technologies, Sebastian Muniz | Site coresecurity.com

Core Security Technologies Advisory - A vulnerability was found in Wonderware SuiteLink Service ('slssvc.exe') that could allow an un-authenticated remote attacker with the ability to connect to the SuiteLink service TCP port to shutdown the service abnormally by sending a malformed packet. Exploitation of the vulnerability for remote code execution has not been proven, but it has not been eliminated as a potential scenario.

tags | advisory, remote, tcp, code execution
advisories | CVE-2008-2005
SHA-256 | cc0017282284a81e4c1b8b21a4c4538842f8dc45ce9d672ef98b6df5d880f5e1
Core Security Technologies Advisory 2008.0123
Posted Mar 19, 2008
Authored by Core Security Technologies, Sebastian Muniz | Site coresecurity.com

Core Security Technologies Advisory - MacOS X Server 10.5, also known as Leopard Server, features a Wiki Server, which is a multiuser web application written in Python. The Wiki Server is vulnerable to a path traversal attack, which can be exploited by non-privileged system users via a forged file upload to write arbitrary files on locations in the server filesystem, restricted only by privileges of the Wiki Server application.

tags | exploit, web, arbitrary, python, file upload
advisories | CVE-2008-1000
SHA-256 | c67ec7aad2757e9458328c5a8740092dd9f2f141c751d7cdcaf51eb246f95da2
Core Security Technologies Advisory 2008.0204
Posted Mar 13, 2008
Authored by Core Security Technologies, Sebastian Muniz | Site coresecurity.com

Core Security Technologies Advisory - Timbuktu Pro suffers from remote path traversal and log injection vulnerabilities.

tags | exploit, remote, vulnerability
advisories | CVE-2008-1117, CVE-2008-1118
SHA-256 | d86243f80adb465a8eb0832d5b4b1a1dc8921c5e790c1bef0c2f4f28fc78447c
Core Security Technologies Advisory 2007.0821
Posted Nov 28, 2007
Authored by Core Security Technologies, Sebastian Muniz | Site coresecurity.com

Core Security Technologies Advisory - Lotus Notes suffers from a buffer overflow vulnerability in the Lotus WorkSheet file processor.

tags | advisory, overflow
SHA-256 | def9e3f9e9a61d8f256c986eaf93946e126019f6138919a51a98b739d7e78cb8
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close