exploit the possibilities
Showing 1 - 15 of 15 RSS Feed

Files Date: 2021-03-24

Worm.Win32.Ngrbot.abpr Insecure Permissions
Posted Mar 24, 2021
Authored by malvuln | Site malvuln.com

Worm.Win32.Ngrbot.abpr malware suffers from an insecure permissions vulnerability.

tags | exploit, worm
systems | windows
MD5 | 659134a5a1759b9458935738d7e5ca0e
Ubuntu Security Notice USN-4887-1
Posted Mar 24, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4887-1 - De4dCr0w of 360 Alpha Lab discovered that the BPF verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker could use this to expose sensitive information or possibly execute arbitrary code. Adam Nichols discovered that heap overflows existed in the iSCSI subsystem in the Linux kernel. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Various other issues were also addressed.

tags | advisory, denial of service, overflow, arbitrary, kernel, local
systems | linux, ubuntu
advisories | CVE-2020-27170, CVE-2020-27171, CVE-2021-27363, CVE-2021-27364, CVE-2021-27365, CVE-2021-3444
MD5 | ec10d1a53d4fcdd31e305a6e8e3837d5
Red Hat Security Advisory 2021-0976-01
Posted Mar 24, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0976-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include denial of service and memory leak vulnerabilities.

tags | advisory, denial of service, vulnerability, memory leak
systems | linux, redhat
advisories | CVE-2020-27827
MD5 | a7382fea42e90d76347dcac72b38eb1c
Online Faculty Clearance System 1.0 Shell Upload
Posted Mar 24, 2021
Authored by th3d1gger

Online Faculty Clearance System version 1.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
MD5 | 79bc85565f117cac4e713d381f853d87
Online Faculty Clearance System 1.0 Cross Site Scripting
Posted Mar 24, 2021
Authored by th3d1gger

Online Faculty Clearance System version 1.0 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
MD5 | 4464502cf50f4cc6a00c0a984646051c
Trojan-Dropper.Win32.Dycler.yhb Insecure Permissions
Posted Mar 24, 2021
Authored by malvuln | Site malvuln.com

Trojan-Dropper.Win32.Dycler.yhb malware suffers from an insecure permissions vulnerability.

tags | exploit, trojan
systems | windows
MD5 | e29fc69ff4dda14c4e8383ddc91f5ffd
Intel RST User Interface / Driver Privilege Escalation
Posted Mar 24, 2021
Authored by Stefan Kanthak

Intel Rapid Storage Technology (RST) User Interface and Driver suffers from a privilege escalation vulnerability.

tags | exploit
MD5 | e647cdaedf7e9e47e97cf2341e94e8ae
Red Hat Security Advisory 2021-0975-01
Posted Mar 24, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0975-01 - The Public Key Infrastructure Core contains fundamental packages required by Red Hat Certificate System. Issues addressed include a cross site scripting vulnerability.

tags | advisory, xss
systems | linux, redhat
advisories | CVE-2019-10146, CVE-2019-10179, CVE-2019-10221, CVE-2020-1721, CVE-2020-25715, CVE-2021-20179
MD5 | 5264eaa9a31e8bbc2a39dbd51520261c
Codiad 2.8.4 Remote Code Execution
Posted Mar 24, 2021
Authored by WangYihang

Codiad version 2.8.4 remote code execution exploit.

tags | exploit, remote, code execution
advisories | CVE-2018-14009
MD5 | 40e0c008f687d615731fb5edca2f3d2a
American Fuzzy Lop plus plus 3.12c
Posted Mar 24, 2021
Authored by van Hauser, thc, Heiko Eissfeldt, Andrea Fioraldi, Dominik Maier | Site thc.org

Google's American Fuzzy Lop is a brute-force fuzzer coupled with an exceedingly simple but rock-solid instrumentation-guided genetic algorithm. afl++ is a superior fork to Google's afl. It has more speed, more and better mutations, more and better instrumentation, custom module support, etc.

Changes: Improvements to afl-fuzz, afl-cc, qemu_mode, and unicorn_mode. Added DEFAULT_PERMISSION to config.h for all files created with 0600 setting.
tags | tool, fuzzer
systems | unix
MD5 | c7c227ffd3fdd61440c3f98fd1e5a380
URL Exploiting - XXE To SSRF
Posted Mar 24, 2021
Authored by Team SafeSecurity

This whitepaper explains how xml external entity and server-side request forgery vulnerabilities work and how they can be combined to perform attacks.

tags | paper, vulnerability
MD5 | ade02889096d0c4736522c32d4c95692
Worm.Win32.Detnat.c Insecure Permissions
Posted Mar 24, 2021
Authored by malvuln | Site malvuln.com

Worm.Win32.Detnat.c malware suffers from an insecure permissions vulnerability.

tags | exploit, worm
systems | windows
MD5 | 1cdc3c79c3abffd54884f2e0b259214a
Ext2Fsd 0.68 Unquoted Service Path
Posted Mar 24, 2021
Authored by Mohammed Alshehri

Ext2Fsd version 0.68 suffers from an unquoted service path vulnerability.

tags | exploit
MD5 | 4a8139b137aeeeb6d21d0e5c75ed5a92
Virus.Win32.Sality.gen Insecure Permissions
Posted Mar 24, 2021
Authored by malvuln | Site malvuln.com

Virus.Win32.Sality.gen malware suffers from an insecure permissions vulnerability.

tags | exploit, virus
systems | windows
MD5 | 009100a4a08b8268e37261c483b7f961
WordPress MapifyLite 3.3 Cross Site Scripting
Posted Mar 24, 2021
Authored by Eagle Eye

WordPress MapifyLife plugin versions 3.3 and below suffer from a persistent cross site scripting vulnerability.

tags | exploit, xss
MD5 | 12998cba1b9d742b2679ff6fcef76da7
Page 1 of 1
Back1Next

File Archive:

April 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    17 Files
  • 2
    Apr 2nd
    2 Files
  • 3
    Apr 3rd
    2 Files
  • 4
    Apr 4th
    0 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    15 Files
  • 7
    Apr 7th
    20 Files
  • 8
    Apr 8th
    16 Files
  • 9
    Apr 9th
    5 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    4 Files
  • 13
    Apr 13th
    8 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close