exploit the possibilities
Showing 1 - 10 of 10 RSS Feed

Files Date: 2021-02-18

Ubuntu Security Notice USN-4739-1
Posted Feb 18, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4739-1 - A large number of security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution.

tags | advisory, remote, web, denial of service, arbitrary, javascript, code execution, xss
systems | linux, ubuntu
advisories | CVE-2020-13558
MD5 | a5feb8fa066d0c3a1865f6e0f2147384
Ubuntu Security Notice USN-4738-1
Posted Feb 18, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4738-1 - Paul Kehrer discovered that OpenSSL incorrectly handled certain input lengths in EVP functions. A remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. Tavis Ormandy discovered that OpenSSL incorrectly handled parsing issuer fields. A remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. Various other issues were also addressed.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2021-23840, CVE-2021-23841
MD5 | ddd35a00ee36d9b3807f0f94e460031e
Backdoor.Win32.Agent.aak Buffer Overflow
Posted Feb 18, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Agent.aak malware suffers from a buffer overflow vulnerability.

tags | exploit, overflow
systems | windows
MD5 | 9c05bcd738259e6d2607b5bf2a011023
Batflat CMS 1.3.6 Remote Code Execution
Posted Feb 18, 2021
Authored by mari0x00

Batflat CMS versions 1.3.6 and below suffer from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2020-35734
MD5 | f52fce6186b9cd8e4501a1b28755bac1
Ubuntu Security Notice USN-4737-1
Posted Feb 18, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4737-1 - It was discovered that Bind incorrectly handled GSSAPI security policy negotiation. A remote attacker could use this issue to cause Bind to crash, resulting in a denial of service, or possibly execute arbitrary code. In the default installation, attackers would be isolated by the Bind AppArmor profile.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2020-8625
MD5 | 495d4f5b0aec882a3b44b696b0874475
Apport 2.20 Privilege Escalation
Posted Feb 18, 2021
Authored by Gr33nh4t

Apport version 2.20 suffers from a local privilege escalation vulnerability.

tags | exploit, local
MD5 | 41ed08c45f621a8c566d4fe5ff7b8474
Red Hat Security Advisory 2021-0423-01
Posted Feb 18, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0423-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.17. Issues addressed include cross site scripting, denial of service, deserialization, and traversal vulnerabilities.

tags | advisory, denial of service, vulnerability, xss
systems | linux, redhat
advisories | CVE-2020-11979, CVE-2020-1945, CVE-2021-21602, CVE-2021-21603, CVE-2021-21604, CVE-2021-21605, CVE-2021-21606, CVE-2021-21607, CVE-2021-21608, CVE-2021-21609, CVE-2021-21610, CVE-2021-21611, CVE-2021-21615
MD5 | 3fca77b118226960e302f343a05c7bfa
Backdoor.Win32.Agent.aak Code Execution / Cross Site Request Forgery
Posted Feb 18, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Agent.aak malware suffers from code execution and cross site request forgery vulnerabilities.

tags | exploit, vulnerability, code execution, csrf
systems | windows
MD5 | 3709fd6065b0c25e41efd07763d6e07d
Backdoor.Win32.Agent.aak Hardcoded Credentials
Posted Feb 18, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Agent.aak malware suffers from a hardcoded credential vulnerability.

tags | exploit
systems | windows
MD5 | 59f7c8d08a2e0c4cbf04ec25fb6b102e
Gitea 1.12.5 Remote Code Execution
Posted Feb 18, 2021
Authored by Podalirius

Gitea version 1.12.5 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
MD5 | 043b07c09c159696122bfc666130307d
Page 1 of 1
Back1Next

File Archive:

February 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    33 Files
  • 2
    Feb 2nd
    30 Files
  • 3
    Feb 3rd
    15 Files
  • 4
    Feb 4th
    8 Files
  • 5
    Feb 5th
    11 Files
  • 6
    Feb 6th
    2 Files
  • 7
    Feb 7th
    1 Files
  • 8
    Feb 8th
    37 Files
  • 9
    Feb 9th
    15 Files
  • 10
    Feb 10th
    11 Files
  • 11
    Feb 11th
    26 Files
  • 12
    Feb 12th
    8 Files
  • 13
    Feb 13th
    1 Files
  • 14
    Feb 14th
    1 Files
  • 15
    Feb 15th
    9 Files
  • 16
    Feb 16th
    33 Files
  • 17
    Feb 17th
    6 Files
  • 18
    Feb 18th
    10 Files
  • 19
    Feb 19th
    20 Files
  • 20
    Feb 20th
    1 Files
  • 21
    Feb 21st
    1 Files
  • 22
    Feb 22nd
    17 Files
  • 23
    Feb 23rd
    15 Files
  • 24
    Feb 24th
    16 Files
  • 25
    Feb 25th
    28 Files
  • 26
    Feb 26th
    25 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close