what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 33 RSS Feed

Files Date: 2020-12-02

I2P 0.9.48
Posted Dec 2, 2020
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Various updates.
tags | tool
systems | unix
SHA-256 | e8c55b17b2066d8eab82bc407128f1f0366530c5429a1413ea0cbf40f922d532
Red Hat Security Advisory 2020-5325-01
Posted Dec 2, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-5325-01 - Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-25660
SHA-256 | 075f8bf44f6f811a575e079675877d4ed64e3a9e786f7f3b20c3d1dd5948af59
Ubuntu Security Notice USN-4659-1
Posted Dec 2, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4659-1 - It was discovered that a race condition existed in the binder IPC implementation in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Daniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen discovered that legacy pairing and secure-connections pairing authentication in the Bluetooth protocol could allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. A physically proximate attacker could use this to impersonate a previously paired Bluetooth device. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, kernel, local, protocol
systems | linux, ubuntu
advisories | CVE-2020-0423, CVE-2020-10135, CVE-2020-14351, CVE-2020-25705, CVE-2020-27152, CVE-2020-28915, CVE-2020-4788
SHA-256 | 9a0f9a2f26c0dfddf7589768d4e433696e87ba393c23e7f724162684bf154fac
Ksix Zigbee Devices Playback Protection Bypass
Posted Dec 2, 2020
Authored by Alejandro Vazquez Vazquez

Ksix Zigbee devices playback protection bypass proof of concept exploit.

tags | exploit, proof of concept
SHA-256 | bb9a8e2468e16c9c046ad0e269e61fe86d1ca52524c1567d20e1f16a03171b9b
Ubuntu Security Notice USN-4658-1
Posted Dec 2, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4658-1 - It was discovered that a race condition existed in the binder IPC implementation in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Daniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen discovered that legacy pairing and secure-connections pairing authentication in the Bluetooth protocol could allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. A physically proximate attacker could use this to impersonate a previously paired Bluetooth device. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, kernel, local, protocol
systems | linux, ubuntu
advisories | CVE-2020-0423, CVE-2020-10135, CVE-2020-14351, CVE-2020-14390, CVE-2020-25211, CVE-2020-25284, CVE-2020-25643, CVE-2020-25645, CVE-2020-25705, CVE-2020-28915, CVE-2020-4788
SHA-256 | 4ed9af991deebf6c3244cf4de2f7dbb22af21f0a04f28319291a7673feba8d42
Simple College Website 1.0 Local File Inclusion
Posted Dec 2, 2020
Authored by mosaaed

Simple College Website version 1.0 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | b44cab5ff0eba5512a4197a21f1083bfd568a5df97fcbdc76ab70a201b0c942b
Red Hat Security Advisory 2020-5317-01
Posted Dec 2, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-5317-01 - PostgreSQL is an advanced object-relational database management system.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-25694, CVE-2020-25695, CVE-2020-25696
SHA-256 | ff42bdc589414c4c39251b278536e7e02bf8d096ee1d7da194fa9ce93c45d1ab
Car Rental Management System 1.0 Local File Inclusion / SQL Injection
Posted Dec 2, 2020
Authored by mosaaed

Car Rental Management System version 1.0 suffers from local file inclusion and remote SQL injection vulnerabilities.

tags | exploit, remote, local, vulnerability, sql injection, file inclusion
SHA-256 | 6c3a9ab09332b9462a85ae9a62c07b1da59b5a0539c1fe4f64d0e752f209eb9f
Red Hat Security Advisory 2020-5316-01
Posted Dec 2, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-5316-01 - PostgreSQL is an advanced object-relational database management system.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-25694, CVE-2020-25695, CVE-2020-25696
SHA-256 | da20a6c71935604f49a4c1020cf1b9d1d94b121eb7d1606289926dbe8cd03a84
WordPress WP-FileManager 6.8 Remote Code Execution
Posted Dec 2, 2020
Authored by Mansoor R

WordPress WP-FileManager plugin version 6.8 remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | 749e41357c44162f47f36ada564f71b7a2871f5903c2a54b740a9a3b2ffd69e1
ChurchCRM 4.2.1 Cross Site Scripting
Posted Dec 2, 2020
Authored by Mufaddal Masalawala

ChurchCRM version 4.2.1 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 89eb66ca076542eadc0c75e2edf4b228b61b94104a54f8955a66afb56277f57d
ChurchCRM 4.2.0 CSV Injection
Posted Dec 2, 2020
Authored by Mufaddal Masalawala

ChurchCRM version 4.2.0 suffers from a CSV formula injection vulnerability.

tags | exploit
SHA-256 | f67f1dd8bf64323fcf6487439b5c3c64bfe3deb0e615cbd5f582f7d378c8e79a
Online Voting System Project In PHP Cross Site Scripting
Posted Dec 2, 2020
Authored by Sagar Banwa

Online Voting System Project in PHP suffers from a persistent cross site scripting vulnerability.

tags | exploit, php, xss
SHA-256 | 8d46647b973dde1d7708f57f4e2f9e6508f23d1e88492b179bfcb273da46303a
NewsLister Cross Site Scripting
Posted Dec 2, 2020
Authored by Emre Aslan

NewsLister suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | dac870b2b6b124c52b7dcbc1e774e521ab7698707a192a9d2021f5c15e180d92
EgavilanMedia User Registration And Login System With Admin Panel 1.0 XSS
Posted Dec 2, 2020
Authored by Soushikta Chowdhury

EgavilanMedia User Registration and Login System with Admin Panel version 1.0 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | d4c4ad574e42e7dc7a62ab1e46b0937967f0769fa0feaef12568f54130a45e3b
DotCMS 20.11 Cross Site Scripting
Posted Dec 2, 2020
Authored by Hardik Solanki

DotCMS version 20.11 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | ea4c95c712c1539dc33fc454c72ff4fab1fe771eea8ff2917a118724bee5bb95
Local Service Search Engine Management System 1.0 SQL Injection
Posted Dec 2, 2020
Authored by Aditya Wakhlu

Local Service Search Engine Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, local, sql injection
advisories | CVE-2021-3278
SHA-256 | 8d2b5de89fa287b36960beba7e33a9e6c7198d12658e7125760060afa06ffbdd
Online News Portal System 1.0 Cross Site Scripting
Posted Dec 2, 2020
Authored by Parshwa Bhavsar

Online News Portal System version 1.0 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 07ffe6e0638dabe2fee7c4cf011f5f206a5edee24d5c3862518b4dd7c0554ef8
Bakeshop Online Ordering System 1.0 Cross Site Scripting
Posted Dec 2, 2020
Authored by Parshwa Bhavsar

Bakeshop Online Ordering System version 1.0 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 3784cebb62d376c694895409b47d31a849e9a814d404526037576f2d7d17aafd
PRTG Network Monitor 20.4.63.1412 Cross Site Scripting
Posted Dec 2, 2020
Authored by Amin Rawah

PRTG Network Monitor version 20.4.63.1412 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2020-14073
SHA-256 | 34d12ce1f4350e907e85a42b144a351534805cb19413c65edf087d127e2065c5
WonderCMS 3.1.3 Remote Code Execution
Posted Dec 2, 2020
Authored by zetc0de

WonderCMS version 3.1.3 suffers from an authenticated remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | 09b8e41fb0a82f2d2ef29e2aa308db43a52c99cd202761dfd2ca36db7d3b27af
WonderCMS 3.1.3 Code Execution / Server-Side Request Forgery
Posted Dec 2, 2020
Authored by zetc0de

WonderCMS version 3.1.3 suffers from an authenticated server-side request forgery vulnerability that allows for remote code execution.

tags | exploit, remote, code execution
SHA-256 | d34e352ab26c4a7204cf313e0156a894e533fda770aa579e75d01803563cebbd
Pharmacy Store Management System 1.0 SQL Injection
Posted Dec 2, 2020
Authored by Aydin Baran Ertemir

Pharmacy Store Management System version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 33b1163a299ecb50d0a3a32e500ef5b1bfea22b201cf080785819fde3886271c
ILIAS Learning Management System 4.3 Server-Side Request Forgery
Posted Dec 2, 2020
Authored by Dot, kx1z0

ILIAS Learning Management System version 4.3 suffers from a server-side request forgery vulnerability.

tags | exploit
SHA-256 | 81cad560ce068e72fc044a01aa5e0f0de59690f83ae6b4da6f7f3bca1bada114
Student Result Management System 1.0 SQL Injection
Posted Dec 2, 2020
Authored by Ritesh Gohil

Student Result Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 68a87e5cd11862c6d942b438b44c2fb1db4d6412645a7a5bde6b93e4c2053605
Page 1 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close