exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 19 of 19 RSS Feed

Files Date: 2021-03-01

Packet Storm New Exploits For February, 2021
Posted Mar 1, 2021
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 189 exploits added to Packet Storm in February, 2021.

tags | exploit
SHA-256 | eec06bab2a2731c58940811e1b9d902dc51e2e33472cf7d6224e696049cdb303
Red Hat Security Advisory 2021-0671-01
Posted Mar 1, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0671-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow, protocol
systems | linux, redhat
advisories | CVE-2020-8625
SHA-256 | 1d23c4e4f2758de7aaa84c8dba3edacae62fd96882dd870d90605511073800e1
American Fuzzy Lop plus plus 3.10c
Posted Mar 1, 2021
Authored by van Hauser, thc, Heiko Eissfeldt, Andrea Fioraldi, Dominik Maier | Site thc.org

Google's American Fuzzy Lop is a brute-force fuzzer coupled with an exceedingly simple but rock-solid instrumentation-guided genetic algorithm. afl++ is a superior fork to Google's afl. It has more speed, more and better mutations, more and better instrumentation, custom module support, etc.

Changes: Mac OS ARM64 support. Android support fixed and updated. Over a dozen other updates and improvements.
tags | tool, fuzzer
systems | unix
SHA-256 | 162148cb689565aa3facf63edacf85555fe2403151a0c65479ee9303639bb7f8
Faraday 3.14.2
Posted Mar 1, 2021
Authored by Francisco Amato | Site github.com

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: Added three new plugins and fixed some old versions of nessus plugins.
tags | tool, rootkit
systems | unix
SHA-256 | 580226c1a76ccecf504a09e1ec5e92234e3dfd26d0242401c414f08073b8faea
FortiLogger 4.4.2.2 Arbitrary File Upload
Posted Mar 1, 2021
Authored by Berkan Er | Site metasploit.com

This Metasploit module exploits an unauthenticated arbitrary file upload via an insecure POST request to Fortilogger. It has been tested on version 4.4.2.2 in Windows 10 Enterprise.

tags | exploit, arbitrary, file upload
systems | windows
advisories | CVE-2021-3378
SHA-256 | 971cb73286c116af5ac4963ebdfc76a9c041ad0cc83639cbcc0c74e784971471
Concrete5 8.5.4 Cross Site Scripting
Posted Mar 1, 2021
Authored by nu11secur1ty

Concrete5 version 8.5.4 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2021-3111
SHA-256 | ac19392af3a74934edad1a97ba2e0362afa7cc9ca0161dbd106631cf67d66b6b
Red Hat Security Advisory 2021-0672-01
Posted Mar 1, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0672-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow, protocol
systems | linux, redhat
advisories | CVE-2020-8625
SHA-256 | b7f20f6de38f3b42806b6f5cda045c86a233bccd35d0412cd67cd3e3f57460a4
Trojan-Spy.Win32.Stealer.osh MVID-2021-0117 Insecure Permissions
Posted Mar 1, 2021
Authored by malvuln | Site malvuln.com

Trojan-Spy.Win32.Stealer.osh malware suffers from an insecure permissions vulnerability.

tags | exploit, trojan
systems | windows
SHA-256 | d80ccaf54b800a91c40ce85d06189cb291b54b037cf18a227ca159bda3cd3e62
Online Catering Reservation System 1.0 Code Execution
Posted Mar 1, 2021
Authored by Christian Vierschilling

Online Catering Reservation System version 1.0 suffers from an unauthenticated remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | a0a4cddbd2ffd5b07cd91a4037e9f8a71130249b611cfbfd1cc3a91d8b3da4c2
Genua GenuGate High Resistance Firewall Authentication Bypass
Posted Mar 1, 2021
Authored by Armin Stock | Site sec-consult.com

Genua GenuGate High Resistance Firewall versions prior to 10.1 p4, 9.6 p7, and 9.0 Z p19 suffer from an authentication bypass vulnerability.

tags | advisory, bypass
advisories | CVE-2021-27215
SHA-256 | 641799a20f14a534fe3b512213475065884772c8836ce0753bf88afc37aa5ea8
Red Hat Security Advisory 2021-0681-01
Posted Mar 1, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0681-01 - The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-20188
SHA-256 | eb7c29c07fa46e239a92b7ee519e9f98248907b70be7e71d60c2c42a00ef9883
Red Hat Security Advisory 2021-0670-01
Posted Mar 1, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0670-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow, protocol
systems | linux, redhat
advisories | CVE-2020-8625
SHA-256 | d2eb04c5f1d2aa8e6342acc20bf9360a544ec363b28ca2175836a4f2414177ee
Covid-19 Contact Tracing System 1.0 Code Execution
Posted Mar 1, 2021
Authored by Christian Vierschilling

Covid-19 Contact Tracing System version 1.0 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | 278525b50c4bd28a56257e6c7cdc3733fb9e864dae0b4e3e4d77473f61c14d90
Code16 Notes Magazine 06
Posted Mar 1, 2021
Authored by Cody Sixteen, code16

Code16 is a compilation of notes from research performed by Cody16. This issue discusses hunting zero days and NagiosXI version 5.8.1.

tags | magazine
SHA-256 | 9d08170ca7e8368c7ed6054ce28231b1a7a290e48949e6483a5248bac54fd78d
Code16 Notes Magazine 05
Posted Mar 1, 2021
Authored by Cody Sixteen, code16

Code16 is a compilation of notes from research performed by Cody16. This issue discusses spelunking routers and learning rust.

tags | magazine
SHA-256 | 0224af1974f4d7cd636ca5d5c883b0d52174f1800ca47ba4a1ba4146652613d8
VMware vCenter Server 7.0 Arbitrary File Upload
Posted Mar 1, 2021
Authored by Photubias

VMware vCenter Server version 7.0 unauthenticated arbitrary file upload exploit.

tags | exploit, arbitrary, file upload
advisories | CVE-2021-21972
SHA-256 | 799c1c46954c9683e557c8e1a417d133206fb6622b8109abd3fd919820dc39a2
Red Hat Security Advisory 2021-0663-01
Posted Mar 1, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0663-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically.

tags | advisory, remote
systems | linux, redhat
advisories | CVE-2021-20178, CVE-2021-20180, CVE-2021-20191, CVE-2021-20228
SHA-256 | 2f8918d6731c8c968757500f7666f71aa88939aa60aa9e8c59ab8798ab503f93
Red Hat Security Advisory 2021-0669-01
Posted Mar 1, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0669-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow, protocol
systems | linux, redhat
advisories | CVE-2020-8625
SHA-256 | 67e663a58b935ad770a30ce931e227cdbfa6bbb0b523b99932fbe9e9f065ffa4
Backdoor.Win32.RemoteManipulator.fdo MVID-2021-0116 Insecure Permissions
Posted Mar 1, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.RemoteManipulator.fdo malware suffers from an insecure permissions vulnerability.

tags | exploit
systems | windows
SHA-256 | f03b984afd871be05dd70256a7ef70a8107c5b1d226619887279108cf6fc9994
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close