This archive contains all of the 189 exploits added to Packet Storm in February, 2021.
eec06bab2a2731c58940811e1b9d902dc51e2e33472cf7d6224e696049cdb303
WiFi Mouse version 1.7.8.5 suffers from a remote code execution vulnerability.
26ee57ad5e56c99a3851bf80a6fd10ad140b41167cd0ad64f51f6c14aa755468
Package Control suffers from an arbitrary file write vulnerability.
d829e043ae3215e9a2fc3e3d229f6478a414c15426280fcd8d1c11242690ef75
Microsoft DirectWrite suffers from a heap-based buffer overflow vulnerability in fsg_ExecuteGlyph while processing variable TTF fonts.
8081b53b0d195e1dda179eb5d68655b804a5f0537401864ffad8e16293222683
Chrome suffers from an out-of-bounds read vulnerability in network DataElement struct traits.
73bdb3c2018e4f00483c57023d4ad271b24afb3c0d0373d8371a68762c872680
Trojan-Proxy.Win32.Delf.ai malware suffers from a buffer overflow vulnerability.
866390aa03272025cc73ec650926217776a29d10190c1e162c2390660d6f3e2b
Doctor Appointment System version 1.0 suffers from multiple cross site scripting vulnerabilities.
9da83e5e3c5ef6553578e21e00c659982d0c45ba621addb95e2170534231adc5
Trojan-Dropper.Win32.Daws.etlm malware suffers from a remote unauthenticated system reboot vulnerability.
5ff53315c75be69b1ef6610acbea460a3e86035c13526b8f9e805efacb3842b4
Online Catering Reservation System version 1.0 suffers from a remote SQL injection vulnerability.
80f98c050837e8bfb1b33f05604131a35a65d0aaafa7350ae7886914f4a30e90
VisualWare MyConnection Server version 11.0b suffers from a remote code execution vulnerability. The vendor has addressed this issue in MyConnection Server release 11.1a build 5522.
4020b71a9e0980a71356d18f6bd3dfc4f61a0062966d3fecc53fabe7c1ae5936
Triconsole version 3.75 suffers from a cross site scripting vulnerability.
a19857f6c105b6b1e1d36191fef80ad25194b3f03f0e2335275e5e1aae5b7707
Zenphoto CMS versions 1.5.7 and below suffer from a remote shell upload vulnerability.
01614a3a00cb5ed47593b0b2db55e9e8732bbe683cd314628bf13ccb9ed70b34
Remote Desktop Web Access suffers form an authentication timing attack vulnerability.
e0b1f12f63b20a9cc74b61503ba89992e54293405c32e5580d3123384d352931
Trojan.Win32.Hotkeychick.am malware suffers from an insecure permissions vulnerability.
926ce16ddd252c24cffbd7bd70b1639446ffa719ab2b28806aa836f0e64e5b2b
Backdoor.Win32.Azbreg.amw malware suffers from an insecure permissions vulnerability.
3dd5cb3caa78049a625b8f3ca1c4d80ac9bfdc80753baa5643018953e00626f3
Trojan-Spy.Win32.SpyEyes.elr malware suffers from an insecure permissions vulnerability.
cfb58bbbb5eb20a2f7fb63fb501ff0bb0414c61fed2dbba4031c8a9722aa8453
Trojan-Dropper.Win32.Daws.etlm malware suffers from a remote unauthenticated system reboot vulnerability.
5ff53315c75be69b1ef6610acbea460a3e86035c13526b8f9e805efacb3842b4
Squid versions 4.14 and 5.0.5 suffer from a double free vulnerability that can result in code execution.
91c0723a75ca7c032b728ecc9d3618db37ce42db5267af97b37ef65f05f7636a
LightCMS version 1.3.4 suffers from a persistent cross site scripting vulnerability.
489d6c40243ba53c59b2924a4df63135bfe4159984831d388fdfb908bf301091
Nagios XI version 5.7.5 suffers from a cross site scripting and multiple remote code execution vulnerabilities.
1c4f0a48f176dfe70f8a573c15bf859e525e542de8476de9e2f2e8911e7b671f
Yeastar TG400 GSM Gateway version 91.3.0.3 suffers from a path traversal vulnerability.
f44bbe91ca4f8dfdd5196a1e8f1790d712feb6f1c16a29856640d2d4a7faab8f
Simple Employee Records System version 1.0 suffers from an unauthenticated remote shell upload vulnerability.
b1999a0e47061647240ab34c2dcece1a2d090e04f6d6e16e2a394deb48d24727
WordPress Under Construction, Coming Soon, and Maintenance Mode plugin version 1.1.1 suffers from cross site scripting and server-side request forgery vulnerabilities.
d58e31b67c514efac3af6b08579604947f92e9e0dc780a874e27f3ac40619845
Trojan.Win32.Gofot.htx malware suffers from a buffer overflow vulnerability.
c5ae2398d25d74c8167d17ab5327fbca1934b8b0dd6644651e4d203affc64cce
Vehicle Parking Management System version 1.0 suffers from a persistent cross site scripting vulnerability.
bd8bed036a8d0fa110d9fbc56316df67a9da41942f39aabe70eaa91a47c7ccb5