exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 2021-03-18

Red Hat Security Advisory 2021-0933-01
Posted Mar 18, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0933-01 - Django is a high-level Python Web framework that encourages rapid development and a clean, pragmatic design. It focuses on automating as much as possible and adhering to the DRY principle.

tags | advisory, web, python
systems | linux, redhat
advisories | CVE-2020-13254
SHA-256 | 3bb5f764149ad76f5ba972f29facbf45fe2ec17bf1c6899b77b2ac4d395776dd
Red Hat Security Advisory 2021-0931-01
Posted Mar 18, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0931-01 - Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups. Issues addressed include buffer overflow and integer overflow vulnerabilities.

tags | advisory, remote, overflow, vulnerability, protocol
systems | linux, redhat
advisories | CVE-2015-8011, CVE-2020-10722, CVE-2020-10723, CVE-2020-10724
SHA-256 | aee2e92a5d62a3326ce4fee4663a721eabe97eae838784244b8e8332fe32c9a9
Red Hat Security Advisory 2021-0934-01
Posted Mar 18, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0934-01 - KVM is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include a use-after-free vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-16092, CVE-2020-1983
SHA-256 | 2b5c18320073ecf25c66e4d201e22aef2bb14c8ca4b155b868543e92e2c69180
Ubuntu Security Notice USN-4881-1
Posted Mar 18, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4881-1 - It was discovered that containerd incorrectly handled certain environment variables. Contrary to expectations, a container could receive environment variables defined for a different container, possibly containing sensitive information.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2021-21334
SHA-256 | 32f3e91229c04792c30e2c26feb8a485f67447efb367340b5266bd1863b9224a
Adobe Reader CoolType Arbitrary Stack Manipulation
Posted Mar 18, 2021
Authored by Google Security Research, mjurczyk

Adobe Reader suffers from a CoolType arbitrary stack manipulation vulnerability.

tags | exploit, arbitrary
advisories | CVE-2021-21086
SHA-256 | e6703e4405ade1d03a75e4857bf44ec5bae3db2765b274db11f9a3907aaa8cda
Hestia Control Panel 1.3.2 Arbitrary File Write
Posted Mar 18, 2021
Authored by numan turle

Hestia Control Panel version 1.3.2 suffers from an arbitrary file write vulnerability.

tags | exploit, arbitrary
SHA-256 | 8b07c29d22da704987a057fc57eda3059e580a1bc74f3d39dc736521084796f9
SEO Panel 4.8.0 SQL Injection
Posted Mar 18, 2021
Authored by Piyush Patil

SEO Panel version 4.8.0 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 583de3aa0ed186e116b94285fd95fe3760b83222c544c3cdca4eb03062ac31fe
VFS For Git 1.0.21014.1 Unquoted Service Path
Posted Mar 18, 2021
Authored by Mohammed Alshehri

VFS for Git version 1.0.21014.1 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | 28767aa5b8bf4aa8490403152a145f9f72920d1194e17c469f2ecda56c2d728b
Red Hat Security Advisory 2021-0937-01
Posted Mar 18, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0937-01 - An update for rubygem-em-http-request is now available for Red Hat OpenStack Platform 13 (Queens). Issues addressed include a man-in-the-middle vulnerability.

tags | advisory, web
systems | linux, redhat
advisories | CVE-2020-13482
SHA-256 | dacd88e23dee43559137de2318763d22c104db62669c8e654726db615385d5c3
rConfig 3.9.6 Shell Upload
Posted Mar 18, 2021
Authored by Murat Seker

rConfig version 3.9.6 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 6644b5820c9bc01a355dc6fe4af61dde28e1ed65ab45d8a1dd89e914c886592c
Red Hat Security Advisory 2021-0916-01
Posted Mar 18, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0916-01 - A highly-available key value store for shared configuration. Issues addressed include denial of service and resource exhaustion vulnerabilities.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
advisories | CVE-2020-15106, CVE-2020-15112, CVE-2020-15113, CVE-2020-15114, CVE-2020-15115, CVE-2020-15136
SHA-256 | 0bdcf046f9fdb59ea9e694ecb80852f244b005d8a32739b4fe9cd5226b0bc65e
VestaCP 0.9.8 Cross Site Scripting
Posted Mar 18, 2021
Authored by numan turle

VestaCP version 0.9.8 suffers from a persistent cross site scripting vulnerability. Original discovery of persistent cross site scripting was discovered in this version in February of 2016 by Necmettin COSKUN.

tags | exploit, xss
SHA-256 | 936b7288bed9dcf93c8a516f91cad5a07fbe2daf994ea79501c73aef2e6153aa
Sony PlayStation 4 Jailbreaking Information
Posted Mar 18, 2021
Authored by sleirsgoevy

Sony Playstation 4 (PS4) versions prior to 7.55 webkit jailbreak exploit.

tags | exploit
SHA-256 | 655871b0530196b6387d2bf7edf10e69f3aca939a12408fec30281898908654e
Red Hat Security Advisory 2021-0915-01
Posted Mar 18, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0915-01 - Django is a high-level Python Web framework that encourages rapid development and a clean, pragmatic design. It focuses on automating as much as possible and adhering to the DRY principle.

tags | advisory, web, python
systems | linux, redhat
advisories | CVE-2020-13254
SHA-256 | d55a76d8e858905d3a7d2cce88793eac3215775c375e473485b19636dff4b0af
Red Hat Security Advisory 2021-0922-01
Posted Mar 18, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0922-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow, protocol
systems | linux, redhat
advisories | CVE-2020-8625
SHA-256 | 8f485aa85fb6da6a34c44a31a5ebdbb4b58fb4157c9e76afe2fd756b840b2b7a
Microsoft Exchange 2019 SSRF / Arbitrary File Write
Posted Mar 18, 2021
Authored by F5

Microsoft Exchange 2019 proxylogon server-side request forgery to arbitrary file write exploit.

tags | exploit, arbitrary
advisories | CVE-2021-26855
SHA-256 | a5a0b4b66c3feed240325ea75b84724ecb668c07a94b286b4c7c0d122cfeae94
FastStone Image Viewer 7.5 Buffer Overflow
Posted Mar 18, 2021
Authored by Paolo Stagno

FastStone Image Viewer version 7.5 stack-based buffer overflow exploit with ASLR and DEP bypass.

tags | exploit, overflow
SHA-256 | d1c9172e53f845d495148db6f2c61b962b311f993f2fbcab31dc91dd00625c10
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close