exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 4 of 4 RSS Feed

Files from Xiaoran Wang

First Active2017-03-01
Last Active2018-05-28
JDA Connect CSRF / Command Execution / Exposed JMX Service
Posted May 28, 2018
Authored by Xiaoran Wang

JDA Connect suffers from cross site request forgery, JMX interface exposure, and command execution vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | 9208639b230a277236982d9d21e65b17c68509bc2d0a40672ac22f324f504dfb
JDA Warehouse Management System Buffer Overflow / SQL Injection / XML Injection
Posted May 28, 2018
Authored by Xiaoran Wang

JDA Warehouse Management System suffers from buffer overflow, code execution, cross site request forgery, XML external entity injection, file disclosure, remote SQL injection, and various other vulnerabilities.

tags | exploit, remote, overflow, vulnerability, code execution, sql injection, csrf
SHA-256 | 80c3d8cda05b3dd2c84304a7b43325ab0b1c8a0d9a228f7465df525ab144814c
Veritas Netbackup 8.0 File Write / Remote Code Execution / Bypass
Posted May 9, 2017
Authored by Google Security Research, Sven Blumenstein, Xiaoran Wang

Veritas Netbackup version 8.0 suffers from remote command execution, file write, and DNS bypass vulnerabilities.

tags | exploit, remote, vulnerability
SHA-256 | 9441d41af1473797296fc43ddefaf261661c75dd930e41a49cd61d55438c61b7
Veritas NetBackup DoS / Command Execution / Privilege Escalation / Traversal
Posted Mar 1, 2017
Authored by Andrew Griffiths, Google Security Research, Sven Blumenstein, Xiaoran Wang

Veritas NetBackup versions 6.5.6 and 7.6.10 suffer from remote command execution, denial of service, path traversal, and privilege escalation vulnerabilities.

tags | exploit, remote, denial of service, vulnerability, file inclusion
SHA-256 | fbc0e17e197a27b1fd0bae15bb4f69d626cea18ab7a047be5ebf20165a1eb24c
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close