exploit the possibilities
Showing 1 - 15 of 15 RSS Feed

Files Date: 2021-04-05

SAP JAVA Configuration Task Execution
Posted Apr 5, 2021
Site onapsis.com

A malicious unauthenticated user could abuse the lack of authentication check on a particular web service exposed by default in SAP Netweaver JAVA stack, allowing them to fully compromise the targeted system. Affected components include SAP Netweaver JAVA versions 7.30 through 7.50 and LM CONFIGURATION WIZARD versions 7.30 SP019 Patch 0000, 7.30 SP020 Patch 0000, 7.31 SP023 Patch 0000, 7.31 SP024 Patch 0000, 7.31 SP025 Patch 0000, 7.31 SP026 Patch 0000, 7.40 SP018 Patch 0000, 7.40 SP019 Patch 0000, 7.40 SP020 Patch 0000, 7.40 SP021 Patch 0000, 7.50 SP012 Patch 0001 and lower, 7.50 SP013 Patch 0002 and lower, 7.50 SP014 Patch 0001 and lower, 7.50 SP015 Patch 0001 and lower, 7.50 SP016 Patch 0001 and lower, 7.50 SP017 Patch 0001 and lower, and 7.50 SP018 Patch 0000.

tags | advisory, java, web
advisories | CVE-2020-6287
MD5 | 44a27772e9c136ff2e4945cc84c95395
SAP Host Control Local Privilege Escalation
Posted Apr 5, 2021
Site onapsis.com

A malicious authenticated attacker, with privileges of SAP SMD Agent access, can exploit certain SAP Host Control functions due to missing input checking, in order to escalate its privileges and execute commands as root/system user. SAPHOSTAGENT versions 7.21 SP045 and lower are affected.

tags | advisory, root
advisories | CVE-2020-6234
MD5 | cd82c2decad0c6dcc50f95839bfbec49
Red Hat Security Advisory 2021-1005-01
Posted Apr 5, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-1005-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.7.5.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-20206, CVE-2021-3121
MD5 | c25b9b9a44ac9f1363773c3c8b3db850
Red Hat Security Advisory 2021-1007-01
Posted Apr 5, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-1007-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.7.5.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-20206, CVE-2021-3121
MD5 | 1d804be0ca84b08daf912081472a4052
Trojan.Win32.Sharer.h Buffer Overflow / Denial Of Service / Heap Corruption
Posted Apr 5, 2021
Authored by malvuln | Site malvuln.com

Trojan.Win32.Sharer.h malware suffers from buffer overflow, denial of service, and heap corruption vulnerabilities.

tags | exploit, denial of service, overflow, trojan, vulnerability
systems | windows
MD5 | 46c6973ce9b92bed3583a9cf27f2d773
Mini Mouse 9.2.0 Path Traversal
Posted Apr 5, 2021
Authored by gosh

Mini Mouse version 9.2.0 suffers from a path traversal vulnerability.

tags | exploit, file inclusion
MD5 | bf7068dcc9ec6cf759296e42c7397713
Mini Mouse 9.2.0 Remote Code Execution
Posted Apr 5, 2021
Authored by gosh

Mini Mouse version 9.2.0 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
MD5 | 92ed69b11c1ba38fe5ae273136aef715
Papoo CMS Cross Site Request Forgery
Posted Apr 5, 2021
Authored by Reinhard Westerholt

Papoo CMS suffers from a cross site request forgery vulnerability. Versions affected include Papoo Light 21.02 Rev. 04f1ca6 and Papoo Pro 6.0.1 Rev. 4770.

tags | advisory, csrf
MD5 | 24598f0838967b6522542275c02cd470
Red Hat Security Advisory 2021-1063-01
Posted Apr 5, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-1063-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. Issues addressed include a null pointer vulnerability.

tags | advisory, protocol
systems | linux, redhat
advisories | CVE-2021-3449
MD5 | 9efc832b1053b83fafa8fe2a8fcb4c8d
Trojan.Win32.Sharer.h Man-In-The-Middle
Posted Apr 5, 2021
Authored by malvuln | Site malvuln.com

Trojan.Win32.Sharer.h malware suffers from a man-in-the-middle vulnerability.

tags | exploit, trojan
systems | windows
MD5 | 83fe4146a16b89a3f4b591f7695bc9bc
OpenEMR 4.1.0 SQL Injection
Posted Apr 5, 2021
Authored by Michael Ikua

OpenEMR version 4.1.0 remote SQL Injection exploit.

tags | exploit, remote, sql injection
MD5 | 14553fa83810666e04f61e897a4946f0
Trojan.Win32.Sharer.h Code Execution
Posted Apr 5, 2021
Authored by malvuln | Site malvuln.com

Trojan.Win32.Sharer.h malware suffers from a code execution vulnerability.

tags | exploit, trojan, code execution
systems | windows
MD5 | d8fb18a00a1ee2f640bfeb75ecd05e69
Red Hat Security Advisory 2021-1006-01
Posted Apr 5, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-1006-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.7.5.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-3121
MD5 | 04fe7e3783108c40240733556287f9b4
Basic Shopping Cart 1.0 SQL Injection
Posted Apr 5, 2021
Authored by Viren Saroha

Basic Shopping Cart version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
MD5 | 684b20a18d440d8bc427b515567526b1
Simple Traffic Offense System 1.0 Cross Site Scripting
Posted Apr 5, 2021
Authored by Richard Jones

Simple Traffic Offense System version 1.0 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
MD5 | c0765890ba077d7218f2533e8198df78
Page 1 of 1
Back1Next

File Archive:

September 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    14 Files
  • 2
    Sep 2nd
    19 Files
  • 3
    Sep 3rd
    9 Files
  • 4
    Sep 4th
    1 Files
  • 5
    Sep 5th
    2 Files
  • 6
    Sep 6th
    3 Files
  • 7
    Sep 7th
    12 Files
  • 8
    Sep 8th
    22 Files
  • 9
    Sep 9th
    17 Files
  • 10
    Sep 10th
    19 Files
  • 11
    Sep 11th
    3 Files
  • 12
    Sep 12th
    2 Files
  • 13
    Sep 13th
    15 Files
  • 14
    Sep 14th
    16 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    7 Files
  • 17
    Sep 17th
    13 Files
  • 18
    Sep 18th
    2 Files
  • 19
    Sep 19th
    2 Files
  • 20
    Sep 20th
    14 Files
  • 21
    Sep 21st
    20 Files
  • 22
    Sep 22nd
    28 Files
  • 23
    Sep 23rd
    13 Files
  • 24
    Sep 24th
    10 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close