exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2021-05-07

macOS Gatekeeper Check Bypass
Posted May 7, 2021
Authored by timwr, Cedric Owens | Site metasploit.com

This Metasploit module serves an OSX app (as a zip) that contains no Info.plist, which bypasses gatekeeper in macOS versions prior to 11.3. If the user visits the site on Safari, the zip file is automatically extracted, and clicking on the downloaded file will automatically launch the payload. If the user visits the site in another browser, the user must click once to unzip the app, and click again in order to execute the payload.

tags | exploit
systems | apple
advisories | CVE-2021-30657
SHA-256 | 63462c2e64d7852458a439220123a2d9aea8f3c2506a1452879ec40fef583f4f
Epic Games Easy Anti-Cheat 4.0 Local Privilege Escalation
Posted May 7, 2021
Authored by LiquidWorm | Site zeroscience.mk

Epic Games Easy Anti-Cheat version 4.0 suffers from a local privilege escalation vulnerability.

tags | exploit, local
SHA-256 | 70bfaf6aa2d0a149604e36475222505015277f0a6da0cde0042196586d13bf3c
Falco 0.28.1
Posted May 7, 2021
Authored by Sysdig | Site sysdig.org

Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

Changes: Major changes include new --support output which includes info about the Falco engine version, new alert output in the unlikely situation it's receiving too many consecutive timeouts without an event, and a new configuration field syscall_event_timeo.
tags | tool, intrusion detection
systems | unix
SHA-256 | bba26936998447734b16decbd3f0551e8873602944788c2f54de4caa95126c85
WifiHotSpot 1.0.0.0 Unquoted Service Path
Posted May 7, 2021
Authored by Erick Galindo

WifiHotSpot version 1.0.0.0 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | 759d7504346096292481e7aea13d262dd89fcd3b6cdc1ece693f18a6faa90ea3
Android Memory Disclosure / Out-Of-Bounds Write / Double-Free
Posted May 7, 2021
Authored by Google Security Research, nedwill

Android suffers from memory disclosure, out-of-bounds write, and double-free vulnerabilities in NFC's Felica tag handling.

tags | exploit, vulnerability
advisories | CVE-2021-0473
SHA-256 | 4db4d57382e328731ad76c3c97332ef31a2266fa29ee8223cb6679b86c5e37c6
Red Hat Security Advisory 2021-1518-01
Posted May 7, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-1518-01 - Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. The ceph-ansible package provides Ansible playbooks for installing, maintaining, and upgrading Red Hat Ceph Storage. Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. The tcmu-runner packages provide a service that handles the complexity of the LIO kernel target's userspace passthrough interface. It presents a C plugin API for extension modules that handle SCSI requests in ways not possible or suitable to be handled by LIO's in-kernel backstores. Issues addressed include denial of service and server-side request forgery vulnerabilities.

tags | advisory, denial of service, kernel, vulnerability
systems | linux, redhat
advisories | CVE-2020-12059, CVE-2020-13379, CVE-2020-27781, CVE-2021-3139
SHA-256 | e87fb4791772030f72c602aaae9c15e3ccdeb0c201ea244532321266dcf4337a
Voting System 1.0 Shell Upload
Posted May 7, 2021
Authored by secure77

Voting System version 1.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | d3348897b3fad5027085d5afcc90c51917dc30ba25e0626c0c13a1f28d45066f
Human Resource Information System 0.1 Remote Code Execution
Posted May 7, 2021
Authored by Reza Afsahi

Human Resource Information System version 0.1 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | 793cded03f1a001351077429215c60aa15d52c9f5387bc22c41ee496b43a7279
Voting System 1.0 SQL Injection
Posted May 7, 2021
Authored by secure77

Voting System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass. Original discovery of SQL injection in this version is attributed to Syed Sheeraz Ali in May of 2021.

tags | exploit, remote, sql injection
SHA-256 | 71de720e5c2debcc4767a15a91f20fed4111e55764b67db69df0d49b2ba4b9b2
Sandboxie Plus 0.7.4 Unquoted Service Path
Posted May 7, 2021
Authored by Erick Galindo

Sandboxie Plus version 0.7.4 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | 72191f8c626e988ebacd81860f29bd4c0956ac75cd898f32ab6881206634b83d
Sandboxie 5.49.7 Denial Of Service
Posted May 7, 2021
Authored by Erick Galindo

Sandboxie version 5.49.7 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | f69dd9d64e85bedc27dbb2590c9822b2fcbfdfe148b8915137d450f9dae8fa40
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close