/13301
Enjoy!
# Multiple Vulnerabilities in IBM Data Risk Manager
### By Pedro Ribeiro (ped...@gmail.com) from [Agile Information
Security](https://agileinfosec.co.uk)
Disclosure Date: 21/04/2020 | Last Updated: 21/04/2020
## Introduction
[From the vendor's website](https://www.ibm.com
/13301
Enjoy!
# Multiple Vulnerabilities in IBM Data Risk Manager
### By Pedro Ribeiro (ped...@gmail.com) from [Agile Information
Security](https://agileinfosec.co.uk)
Disclosure Date: 21/04/2020 | Last Updated: 21/04/2020
## Introduction
[From the vendor's website](https://www.ibm.com
!
>> Multiple critical vulnerabilities in Cisco UCS Director, Cisco
Integrated Management Controller Supervisor and Cisco UCS Director
Express for Big Data
>> Discovered by Pedro Ribeiro (ped...@gmail.com) from Agile Informat
ltiple vulnerabilities in Cisco Identity Services Engine
(unauthenticated stored XSS to RCE as root)
>> Discovered by Pedro Ribeiro (ped...@gmail.com), Agile Information
Security and Dominik Czarnota (dominik.b.czarn.
://raw.githubusercontent.com/pedrib/PoC/master/advisories/nuuo-cms-ownage.txt
>> Multiple vulnerabilities in NUUO Central Management Server
>> Discovered by Pedro Ribeiro (ped...@gmail.com), Agile Information
Security (http://www.agilei
icated remote code execution and privilege escalation in
Cisco Prime Infrastructure
>> Discovered by Pedro Ribeiro (ped...@gmail.com), Agile Information
Security (http://www.agileinfosec.co.uk/)
==
Disclosure: 4/10/2018 /
module has been released, and it is pending approval:
https://github.com/rapid7/metasploit-framework/pull/10108
Regards,
Pedro
>> Multiple vulnerabilities in IBM QRadar SIEM
>> Discovered by Pedro Ribeiro (ped...@gmail.com), Agile Information
Security (http://www.agilei
at
https://blogs.securiteam.com/index.php/archives/3681
>> DrayTek VigorACS 2 Unsafe Flex AMF Java Object Deserialization
>> Discovered by Pedro Ribeiro (ped...@gmail.com), Agile Information
Security
=
Di
can change via mobile devices — you get
> full access to everything, from any device that can run a web browser”
>
> The vulnerabilities found are:
>
> Access bypass
> Configuration manipulation
>
> Credit
> An independent security researcher, Pedro Ribeiro (pedrib_at_gma
://github.com/pedrib/PoC) and in the SSD blog at
https://blogs.securiteam.com/index.php/archives/2713. A big thanks to
SecuriTeam for helping out as always.
>> Multiple critical vulnerabilities in BMC Track-It! 11.4
>> Discovered by Pedro Ribeiro (ped...@gmail.com), Agile Informat
to fix this vulnerability. This claim was NOT verified.
The beta firmware can be downloaded from:
http://kb.netgear.com/36549/Insecure-Remote-Access-and-Command-Execution-Security-Vulnerability?cid=wmt_netgear_organic
Regards,
Pedro
On 20/12/16 21:42, Pedro Ribeiro wrote:
> Hi,
>
> tl
/archives/2910
http://www.beyondsecurity.com/ssd
Regards,
Pedro
===
>> Multiple vulnerabilities in TrueOnline / ZyXEL / Billion routers
>> Discovered by Pedro Ribeiro (ped...@gmail.com), Agile Informat
pedrib/PoC/master/advisories/netgear-wnr2000.txt
Regards,
Pedro
>> Stack buffer overflow vulnerability in NETGEAR WNR2000 router
>> Discovered by Pedro Ribeiro (ped...@gmail.com), Agile Information
Security
==
Disclos
/dlink-hnap-login.txt
Have fun.
Regards,
Pedro
>> Multiple vulnerabilities in Dlink DIR routers HNAP Login function
(multiple routers affected)
>> Discovered by Pedro Ribeiro (ped...@gmail.com), Agile Informat
lities in WebNMS Framework Server 5.2 and 5.2 SP1
>> Discovered by Pedro Ribeiro (ped...@gmail.com), Agile Information
Security
==
Disclosure: 04/07/2016 / Last updated: 08/08/2016
>> Background on the affecte
On 04/08/16 17:46, Pedro Ribeiro wrote:
> tl;dr
>
> Lots of RCE, hardcoded credentials, stack buffer overflow and
> information disclosure in the Nuuo NVRmini and other network video
> recorders of the same vendor.
> These vulnerabilities also affect the NETGEAR Surveillanc
Rmini2 / NVRsolo / Crystal devices
and NETGEAR ReadyNAS Surveillance application
>> Discovered by Pedro Ribeiro (ped...@gmail.com), Agile Information
Security (http://www.agileinfosec.co.uk/)
==
Disclosure: 04/08/2016 / Last
/ arbitrary file download in NETGEAR ProSafe
Network Management System NMS300
>> Discovered by Pedro Ribeiro (ped...@gmail.com), Agile Information
Security (http://www.agileinfosec.co.uk/)
==
Disclosure: 04/02/2016 / La
Administrator
Discovered by Pedro Ribeiro (ped...@gmail.com), Agile Information Security
(http://www.agileinfosec.co.uk/)
==
Disclosure: 13/07/2015 / Last updated: 13/07/2015
Background on the affected product:
Kaseya VSA
/pull/5472
https://github.com/rapid7/metasploit-framework/pull/5473
https://github.com/rapid7/metasploit-framework/pull/5474
Multiple vulnerabilities in SysAid Help Desk 14.4
Discovered by Pedro Ribeiro (ped...@gmail.com), Agile Information Security
hopefully be
accepted soon [2].
Regards,
Pedro
Remote code execution in Novell ZENworks Configuration Management 11.3.1
Discovered by Pedro Ribeiro (ped...@gmail.com), Agile Information Security
=
Disclosure: 07/04/2015
,
Applications Manager and IT360
Discovered by Pedro Ribeiro (ped...@gmail.com), Agile Information Security
==
Disclosure: 28/01/2014 / Last updated: 28/01/2014
Background on the affected products:
ManageEngine OpManager is a network
Discovered by Pedro Ribeiro (ped...@gmail.com), Agile Information Security
==
Disclosure: 30/11/2014 / Last updated: 30/11/2014
Background on the affected product:
NetFlow Analyzer, a complete traffic analytics tool, leverages
On 30 Nov 2014 00:17, Pedro Ribeiro ped...@gmail.com wrote:
Hi,
This is part 9 of the ManageOwnage series. For previous parts see [1].
Technical details:
Vulnerability: Arbitrary file download
Constraints: unauthenticated in NetFlow; authenticated in IT360
Affected versions: NetFlow v8.6
,
Pedro
Authenticated blind SQL injection in Password Manager Pro / Pro MSP
Discovered by Pedro Ribeiro (ped...@gmail.com), Agile Information Security
==
Disclosure: 08/11/2014 / Last updated: 08/11/2014
Background
On 3 September 2014 07:23, Pedro Ribeiro ped...@gmail.com wrote:
On 31 August 2014 16:39, Advisories advisor...@mogwaisecurity.de wrote:
Mogwai Security Advisory MSA-2014-01
--
Title: ManageEngine EventLog
On 31 August 2014 16:39, Advisories advisor...@mogwaisecurity.de wrote:
Mogwai Security Advisory MSA-2014-01
--
Title: ManageEngine EventLog Analyzer Multiple Vulnerabilities
Product:ManageEngine
Hi all,
h0ng10 from Mogway Security has found a file upload leading to RCE in
Eventlog Analyzer (see advisory below for a snippet or go to
http://seclists.org/fulldisclosure/2014/Aug/86).
h0ng10 communicated this over a year ago to ManageEngine but they
failed to fix it. When I found and
.
A copy of the advisory below is available in my repo at
https://raw.githubusercontent.com/pedrib/PoC/master/me_dc9_file_upload.txt
Regards,
Pedro
Arbitrary file upload / remote code execution in ManageEngine Desktop
Central / Desktop Central MSP
Discovered by Pedro Ribeiro (ped...@gmail.com
:
Are you sure that this is an MD5 Hash? It looks more like a base64 encoded
string (decoded value :N yZX@{ )
On Wed, Aug 27, 2014 at 5:50 PM, Pedro Ribeiro ped...@gmail.com wrote:
On 27 Aug 2014 19:14, Pedro Ribeiro ped...@gmail.com wrote:
Hi,
You can read the usernames and MD5 hashed
On 19 Aug 2014 17:55, Pedro Ribeiro ped...@gmail.com wrote:
TL;DR
CVE-2014-3996 / CVE-2014-3997
Blind SQL injection in ManageEngine Desktop Central, Password Manager
Pro and IT360 (including MSP versions)
Scroll to the bottom for the Metasploit module link; the module will
be submitted
a customer requests it. See details below.
User credential disclosure in ManageEngine DeviceExpert 5.9
Discovered by Pedro Ribeiro (ped...@gmail.com), Agile Information Security
==
Background on the affected product
On 27 Aug 2014 19:14, Pedro Ribeiro ped...@gmail.com wrote:
Hi,
You can read the usernames and MD5 hashed passwords of all the users
in the Device Expert application by sending an unauthenticated
request.
I am releasing this as a 0 day as ManageEngine have responded that
they do
.
==
Blind SQL injection in ManageEngine Desktop Central, Password Manager Pro
and IT360 (including MSP versions)
Discovered by Pedro Ribeiro (ped...@gmail.com), Agile Information Security
On 12 May 2014 19:48, Pete Herzog li...@isecom.org wrote:
Hi, I’m your friend and security researcher, Pete Herzog. You might
know me from other public service announcements such as the widely
anticipated, upcoming workshop Secrets of Security, and critic’s
choice award winners: Teaching Your
35 matches
Mail list logo