exploit the possibilities
Showing 1 - 19 of 19 RSS Feed

Files Date: 2021-03-01

Packet Storm New Exploits For February, 2021
Posted Mar 1, 2021
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 189 exploits added to Packet Storm in February, 2021.

tags | exploit
MD5 | 8f655667c2910dd23d0a8074a7e21dfd
Red Hat Security Advisory 2021-0671-01
Posted Mar 1, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0671-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow, protocol
systems | linux, redhat
advisories | CVE-2020-8625
MD5 | bfd45a8574693666d4ce4064848f7232
American Fuzzy Lop plus plus 3.10c
Posted Mar 1, 2021
Authored by van Hauser, thc, Heiko Eissfeldt, Andrea Fioraldi, Dominik Maier | Site thc.org

Google's American Fuzzy Lop is a brute-force fuzzer coupled with an exceedingly simple but rock-solid instrumentation-guided genetic algorithm. afl++ is a superior fork to Google's afl. It has more speed, more and better mutations, more and better instrumentation, custom module support, etc.

Changes: Mac OS ARM64 support. Android support fixed and updated. Over a dozen other updates and improvements.
tags | tool, fuzzer
systems | unix
MD5 | e135b8d1d4bbdf073be46591e8244f8a
Faraday 3.14.2
Posted Mar 1, 2021
Authored by Francisco Amato | Site github.com

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: Added three new plugins and fixed some old versions of nessus plugins.
tags | tool, rootkit
systems | unix
MD5 | 7f7b45a110a9067eae5385f79d12e000
FortiLogger 4.4.2.2 Arbitrary File Upload
Posted Mar 1, 2021
Authored by Berkan Er | Site metasploit.com

This Metasploit module exploits an unauthenticated arbitrary file upload via an insecure POST request to Fortilogger. It has been tested on version 4.4.2.2 in Windows 10 Enterprise.

tags | exploit, arbitrary, file upload
systems | windows
advisories | CVE-2021-3378
MD5 | 986492d22038a772f87e46c47ea24f02
Concrete5 8.5.4 Cross Site Scripting
Posted Mar 1, 2021
Authored by nu11secur1ty

Concrete5 version 8.5.4 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2021-3111
MD5 | 31516dc5fe79d5bc6594c0c2b8bd9695
Red Hat Security Advisory 2021-0672-01
Posted Mar 1, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0672-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow, protocol
systems | linux, redhat
advisories | CVE-2020-8625
MD5 | e0fa13eeb6d174e6c0b8438abc4158bd
Trojan-Spy.Win32.Stealer.osh Insecure Permissions
Posted Mar 1, 2021
Authored by malvuln | Site malvuln.com

Trojan-Spy.Win32.Stealer.osh malware suffers from an insecure permissions vulnerability.

tags | exploit, trojan
systems | windows
MD5 | cd988557999568e9524b9a02af153c2d
Online Catering Reservation System 1.0 Code Execution
Posted Mar 1, 2021
Authored by Christian Vierschilling

Online Catering Reservation System version 1.0 suffers from an unauthenticated remote code execution vulnerability.

tags | exploit, remote, code execution
MD5 | 0bf36bbfde85c322826249f0163222b2
Genua GenuGate High Resistance Firewall Authentication Bypass
Posted Mar 1, 2021
Authored by Armin Stock | Site sec-consult.com

Genua GenuGate High Resistance Firewall versions prior to 10.1 p4, 9.6 p7, and 9.0 Z p19 suffer from an authentication bypass vulnerability.

tags | advisory, bypass
advisories | CVE-2021-27215
MD5 | 0161acaf18b16e7aa3d543af4bf41a1a
Red Hat Security Advisory 2021-0681-01
Posted Mar 1, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0681-01 - The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-20188
MD5 | 0bd7ffecf4ac052cd8bfa37e89156407
Red Hat Security Advisory 2021-0670-01
Posted Mar 1, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0670-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow, protocol
systems | linux, redhat
advisories | CVE-2020-8625
MD5 | 124fdacfda79f378650bf6d6ccedc577
Covid-19 Contact Tracing System 1.0 Code Execution
Posted Mar 1, 2021
Authored by Christian Vierschilling

Covid-19 Contact Tracing System version 1.0 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
MD5 | 596f3efb1cd2f8ac3d549ca46576b6f9
Code16 Notes Magazine 06
Posted Mar 1, 2021
Authored by Cody Sixteen, code16

Code16 is a compilation of notes from research performed by Cody16. This issue discusses hunting zero days and NagiosXI version 5.8.1.

tags | magazine
MD5 | 62744c3d9ed7e44475b394088fc33eb7
Code16 Notes Magazine 05
Posted Mar 1, 2021
Authored by Cody Sixteen, code16

Code16 is a compilation of notes from research performed by Cody16. This issue discusses spelunking routers and learning rust.

tags | magazine
MD5 | 37b8ab4ef1c1eaa9507bce69cacc9d7c
VMware vCenter Server 7.0 Arbitrary File Upload
Posted Mar 1, 2021
Authored by Photubias

VMware vCenter Server version 7.0 unauthenticated arbitrary file upload exploit.

tags | exploit, arbitrary, file upload
advisories | CVE-2021-21972
MD5 | 8dcbcd4aa0bd7cc8803e9bfffc6bc6cd
Red Hat Security Advisory 2021-0663-01
Posted Mar 1, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0663-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically.

tags | advisory, remote
systems | linux, redhat
advisories | CVE-2021-20178, CVE-2021-20180, CVE-2021-20191, CVE-2021-20228
MD5 | 0f4657626d36a5c454118f41bb73a2c4
Red Hat Security Advisory 2021-0669-01
Posted Mar 1, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0669-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow, protocol
systems | linux, redhat
advisories | CVE-2020-8625
MD5 | 56f3f671d96215afb6a42102e9f58f8c
Backdoor.Win32.RemoteManipulator.fdo Insecure Permissions
Posted Mar 1, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.RemoteManipulator.fdo malware suffers from an insecure permissions vulnerability.

tags | exploit
systems | windows
MD5 | 170a73b9758d66901b465b56ab98be6d
Page 1 of 1
Back1Next

File Archive:

June 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    35 Files
  • 2
    Jun 2nd
    14 Files
  • 3
    Jun 3rd
    40 Files
  • 4
    Jun 4th
    22 Files
  • 5
    Jun 5th
    1 Files
  • 6
    Jun 6th
    1 Files
  • 7
    Jun 7th
    19 Files
  • 8
    Jun 8th
    14 Files
  • 9
    Jun 9th
    39 Files
  • 10
    Jun 10th
    20 Files
  • 11
    Jun 11th
    22 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close