what you don't know can hurt you
Showing 1 - 12 of 12 RSS Feed

Files Date: 2021-05-20

Red Hat Security Advisory 2021-2085-01
Posted May 20, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2085-01 - Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. Issues addressed include a bypass vulnerability.

tags | advisory, bypass
systems | linux, redhat
advisories | CVE-2021-31921
MD5 | 9212bf11498d6800ac0df8f187a34d19
Red Hat Security Advisory 2021-2077-01
Posted May 20, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2077-01 - Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Issues addressed include buffer overflow, denial of service, and memory leak vulnerabilities.

tags | advisory, remote, denial of service, overflow, vulnerability, protocol, memory leak
systems | linux, redhat
advisories | CVE-2015-8011, CVE-2020-27827, CVE-2020-35498
MD5 | e5fbc22cfb44a5a7b86dea3dfc6921b9
Red Hat Security Advisory 2021-2070-01
Posted May 20, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2070-01 - Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.4.7 serves as a replacement for Red Hat Single Sign-On 7.4.6, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include an information leakage vulnerability.

tags | advisory, web
systems | linux, redhat
advisories | CVE-2021-21290, CVE-2021-21295, CVE-2021-3424, CVE-2021-3461
MD5 | fd8c8742d078d4c879d9be432cee3481
Spotweb-Develop 1.4.9 Cross Site Scripting
Posted May 20, 2021
Authored by nu11secur1ty

Spotweb-Develop version 1.4.9 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 54aca54a561f4966b3e93115c54b1141
GRR 3.4.3.1
Posted May 20, 2021
Authored by Andreas Moser, Mikhail Bushkov, Ben Galehouse, Milosz Lakomy | Site github.com

GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data.

Changes: Prometheus/Grafana support have been added. A new collect large file flow has been added. New Elasticsearch output plugin. Multiple API changes, bug fixes, and various minor enhancements.
tags | tool, remote, web, forensics
systems | unix
MD5 | 1a7ed689be76b9bf6d9512f216533c0e
Red Hat Security Advisory 2021-2063-01
Posted May 20, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2063-01 - Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.4.7 serves as a replacement for Red Hat Single Sign-On 7.4.6, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.

tags | advisory, web
systems | linux, redhat
advisories | CVE-2021-3424, CVE-2021-3461
MD5 | 4b4d931a8f010afd5111a8fb0de3b860
Red Hat Security Advisory 2021-2064-01
Posted May 20, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2064-01 - Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.4.7 serves as a replacement for Red Hat Single Sign-On 7.4.6, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.

tags | advisory, web
systems | linux, redhat
advisories | CVE-2021-3424, CVE-2021-3461
MD5 | cd4b39352e35e761cb574393dfce6d49
Red Hat Security Advisory 2021-2065-01
Posted May 20, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2065-01 - Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.4.7 serves as a replacement for Red Hat Single Sign-On 7.4.6, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.

tags | advisory, web
systems | linux, redhat
advisories | CVE-2021-3424, CVE-2021-3461
MD5 | aa2a659108326b5b35e6c423ef4babf0
Red Hat Security Advisory 2021-2061-01
Posted May 20, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2061-01 - Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. Issues addressed include a bypass vulnerability.

tags | advisory, bypass
systems | linux, redhat
advisories | CVE-2021-31921
MD5 | 998d14e9fc8856405feedc8caaa97bd3
Acer Updater Service 1.2.3500.0 Unquoted Service Path
Posted May 20, 2021
Authored by Emmanuel Lujan

Acer Updater Service version 1.2.3500.0 suffers from an unquoted service path vulnerability.

tags | exploit
MD5 | 876ca1fe372e508309168e7bb73a71da
Acer Backup Manager Module 3.0.0.99 Unquoted Service Path
Posted May 20, 2021
Authored by Emmanuel Lujan

Acer Backup Manager Module version 3.0.0.99 suffers an unquoted service path vulnerability.

tags | exploit
MD5 | 4c3a4c14d7a02e8f62c463c6ab22446d
Microsoft HTTP Protocol Stack Remote Code Execution
Posted May 20, 2021
Authored by 0vercl0k

Proof of concept exploit for the HTTP protocol stack remote code execution vulnerability related to a use-after-free dereference in http.sys.

tags | exploit, remote, web, code execution, protocol, proof of concept
advisories | CVE-2021-31166
MD5 | 231a2e9926b68408725ba7d1ab0d8acd
Page 1 of 1
Back1Next

File Archive:

September 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    14 Files
  • 2
    Sep 2nd
    19 Files
  • 3
    Sep 3rd
    9 Files
  • 4
    Sep 4th
    1 Files
  • 5
    Sep 5th
    2 Files
  • 6
    Sep 6th
    3 Files
  • 7
    Sep 7th
    12 Files
  • 8
    Sep 8th
    22 Files
  • 9
    Sep 9th
    17 Files
  • 10
    Sep 10th
    19 Files
  • 11
    Sep 11th
    3 Files
  • 12
    Sep 12th
    2 Files
  • 13
    Sep 13th
    15 Files
  • 14
    Sep 14th
    16 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    7 Files
  • 17
    Sep 17th
    13 Files
  • 18
    Sep 18th
    2 Files
  • 19
    Sep 19th
    2 Files
  • 20
    Sep 20th
    14 Files
  • 21
    Sep 21st
    20 Files
  • 22
    Sep 22nd
    28 Files
  • 23
    Sep 23rd
    13 Files
  • 24
    Sep 24th
    10 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close