what you don't know can hurt you
Showing 1 - 15 of 15 RSS Feed

Files Date: 2021-03-02

Zeek 4.0.0
Posted Mar 2, 2021
Authored by Robin Sommer, Vern Paxson | Site zeek.org

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.

Changes: Added support for EDNS0 Cookie and Keep-Alive options. Added new Packet Analysis plugin architecture for parsing packet headers at layers below the existing Session analysis plugins. A few other additions as well as improvements to capture-loss.zeek.
tags | tool, intrusion detection
systems | unix
MD5 | 3178eb66e9ac62e8e61707d34c8855f9
Suricata IDPE 6.0.2
Posted Mar 2, 2021
Site openinfosecfoundation.org

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

Changes: Fixed crashes, a leak in signature parsing with urilen, a CPU exhaustion issue, and many other bugs.
tags | tool, intrusion detection
systems | unix
MD5 | 4024fd07bed74c22874862a501311241
Red Hat Security Advisory 2021-0691-01
Posted Mar 2, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0691-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow, protocol
systems | linux, redhat
advisories | CVE-2020-8625
MD5 | f0381c429f9847739711558bd9e72f17
Ubuntu Security Notice USN-4737-2
Posted Mar 2, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4737-2 - USN-4737-1 fixed a vulnerability in Bind. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. It was discovered that Bind incorrectly handled GSSAPI security policy negotiation. A remote attacker could use this issue to cause Bind to crash, resulting in a denial of service, or possibly execute arbitrary code. In the default installation, attackers would be isolated by the Bind AppArmor profile. Various other issues were also addressed.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2020-8625
MD5 | 349b92ba169e163fb5fd0d5408cd2389
Web Based Quiz System 1.0 Cross Site Scripting
Posted Mar 2, 2021
Authored by Praharsh Kumar Singh

Web Based Quiz System version 1.0 suffers from a persistent cross site scripting vulnerability related to MCQ options.

tags | exploit, web, xss
MD5 | 33d7b64ac2b9aead162afda02fdb40a1
CASAP Automated Enrollment System 1.1 SQL Injection
Posted Mar 2, 2021
Authored by nu11secur1ty

CASAP Automated Enrollment System version 1.1 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
MD5 | f14a5fa36f519bbb6ec4f2ba3a6c5e79
Red Hat Security Advisory 2021-0692-01
Posted Mar 2, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0692-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow, protocol
systems | linux, redhat
advisories | CVE-2020-8625
MD5 | 8caca0ef99e41c3551109b396490476f
Zen Cart 1.5.7b Remote Code Execution
Posted Mar 2, 2021
Authored by Mucahit Saratar | Site metasploit.com

This Metasploit module exploits a remote code execution vulnerability in Zen Cart version 1.5.7b.

tags | exploit, remote, code execution
advisories | CVE-2021-3291
MD5 | a50e2ef38a3a7c65933f892f83d8693d
Red Hat Security Advisory 2021-0693-01
Posted Mar 2, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0693-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow, protocol
systems | linux, redhat
advisories | CVE-2020-8625
MD5 | 35e0bb96bebc4ceaed44186e0596eb4e
Profiling System For Human Resource Management 1.0 Cross Site Scripting
Posted Mar 2, 2021
Authored by Richard Jones

Profiling System For Human Resource Management version 1.0 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
MD5 | 8880e83723b9ae2d6ad66acbdb8c253c
Red Hat Security Advisory 2021-0694-01
Posted Mar 2, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0694-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow, protocol
systems | linux, redhat
advisories | CVE-2020-8625
MD5 | 9c30e51fe0454b5e707c52c4839378fe
Red Hat Security Advisory 2021-0686-01
Posted Mar 2, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0686-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2020-0444, CVE-2020-14351, CVE-2020-25705, CVE-2020-29661
MD5 | 39d6802993abe938930544f16912e7dc
Web Based Quiz System 1.0 Cross Site Scripting
Posted Mar 2, 2021
Authored by P.Naveen Kumar

Web Based Quiz System version 1.0 suffers from a persistent cross site scripting vulnerability in the name field.

tags | exploit, web, xss
MD5 | 1db1bfe9e6bec3cc8f5d41b082884456
Red Hat Security Advisory 2021-0689-01
Posted Mar 2, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0689-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2020-0444, CVE-2020-29661
MD5 | 4945818ac12248278aae01aed5b909f3
TinyTinyRSS Remote Code Execution
Posted Mar 2, 2021
Authored by Benjamin Nadarevic, Daniel Neagaru

TinyTinyRSS remote code execution exploit. Versions prior to 2020-09-16 are affected.

tags | exploit, remote, code execution
advisories | CVE-2020-25787
MD5 | 79de8a89a9854c71810d28d7c897d82a
Page 1 of 1
Back1Next

File Archive:

April 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    17 Files
  • 2
    Apr 2nd
    2 Files
  • 3
    Apr 3rd
    2 Files
  • 4
    Apr 4th
    0 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    15 Files
  • 7
    Apr 7th
    20 Files
  • 8
    Apr 8th
    16 Files
  • 9
    Apr 9th
    5 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    4 Files
  • 13
    Apr 13th
    15 Files
  • 14
    Apr 14th
    27 Files
  • 15
    Apr 15th
    19 Files
  • 16
    Apr 16th
    7 Files
  • 17
    Apr 17th
    1 Files
  • 18
    Apr 18th
    1 Files
  • 19
    Apr 19th
    19 Files
  • 20
    Apr 20th
    18 Files
  • 21
    Apr 21st
    30 Files
  • 22
    Apr 22nd
    18 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close