exploit the possibilities
Showing 1 - 16 of 16 RSS Feed

Files Date: 2021-05-24

Red Hat Security Advisory 2021-1563-01
Posted May 24, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-1563-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.7.12.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-3121
MD5 | 5e54be96a34f12d61651b5e61b81426a
Red Hat Security Advisory 2021-1561-01
Posted May 24, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-1561-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include denial of service and integer overflow vulnerabilities.

tags | advisory, denial of service, overflow, vulnerability
systems | linux, redhat
advisories | CVE-2020-27813, CVE-2020-28362, CVE-2021-21639, CVE-2021-21640, CVE-2021-28163, CVE-2021-28165, CVE-2021-30465, CVE-2021-3114
MD5 | db5864d57571f4d882812ae1839ed9ff
Red Hat Security Advisory 2021-1562-01
Posted May 24, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-1562-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.7.12.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-30465
MD5 | 951fd3d318e26088687c86cdf2a27fd4
Red Hat Security Advisory 2021-2095-01
Posted May 24, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2095-01 - Red Hat OpenShift Serverless Client kn 1.14.1 provides a CLI to interact with Red Hat OpenShift Serverless 1.14.1. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms. Issues addressed include a code execution vulnerability.

tags | advisory, code execution
systems | linux, redhat
advisories | CVE-2021-3114, CVE-2021-3115
MD5 | 8ae9dda1a65ff37de19b5cec98cf595c
Red Hat Security Advisory 2021-2093-01
Posted May 24, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2093-01 - Red Hat OpenShift Serverless 1.14.1 is a generally available release of the OpenShift Serverless Operator. This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6 and 4.7, and includes security and bug fixes and enhancements. For more information, see the documentation listed in the References section. Issues addressed include a code execution vulnerability.

tags | advisory, code execution
systems | linux, redhat
advisories | CVE-2021-3114, CVE-2021-3115
MD5 | 9e2a5010e4be870fe881f12866ceb29c
Backdoor.Win32.Tonerok.d Code Execution
Posted May 24, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Tonerok.d malware suffers from a code execution vulnerability.

tags | exploit, code execution
systems | windows
MD5 | 7025d264db8427c0934a96c52d9e5142
Codiad 2.8.4 Remote Code Execution
Posted May 24, 2021
Authored by Ron Jost

Codiad version 2.8.4 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2019-19208
MD5 | 0dbcdaefecfb8baa6728cc0c5caad922
Backdoor.Win32.Spion4 Insecure Transit
Posted May 24, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Spion4 malware suffers from insecure transit issues.

tags | exploit
systems | windows
MD5 | 2e20e2b52d8b3949a09e35135e3b7605
Schlix CMS 2.2.6-6 Shell Upload / Directory Traversal
Posted May 24, 2021
Authored by Emir Polat

Schlix CMS version 2.2.6-6 suffers from an arbitrary file upload and a directory traversal that together can lead to remote command execution.

tags | exploit, remote, arbitrary, file inclusion, file upload
MD5 | f2f6e3d92179511f87fa66f851387309
PHP 8.1.0-dev Backdoor Remote Command Injection
Posted May 24, 2021
Authored by Richard Jones

PHP version 8.1.0-dev backdoor unauthenticated remote command injection exploit.

tags | exploit, remote, php
MD5 | a54b850535116f4636c38a6855b8cf15
Shopizer 2.16.0 Cross Site Scripting
Posted May 24, 2021
Authored by Marek Toth

Shopizer versions 2.16.0 and below suffer from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 455eaca44a7667f0e47ed7c2f5c91712
iDailyDiary 4.30 Denial Of Service
Posted May 24, 2021
Authored by Ismael Nava

iDailyDiary version 4.30 suffers from a denial of service vulnerability.

tags | exploit, denial of service
MD5 | e487cd68a52c6d68fab72a105b95225d
Backdoor.Win32.Upload.a Denial Of Service
Posted May 24, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Upload.a malware suffers from a denial of service vulnerability.

tags | exploit, denial of service
systems | windows
MD5 | 30b82b724c7f3aba216470fc70bec4e7
Backdoor.Win32.Spirit.12.b Insecure Permissions
Posted May 24, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Spirit.12.b malware suffers from an insecure permissions vulnerability.

tags | exploit
systems | windows
MD5 | 23e8d96e7fa8dcf13e94ad19f51e7146
WordPress ReDi Restaurant Reservation 21.0307 Cross Site Scripting
Posted May 24, 2021
Authored by Bastijn Ouwendijk

WordPress ReDi Restaurant Reservation plugin version 21.0307 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2021-24299
MD5 | 97371d46e078284e75d608dc3d9438a0
D-Link DWR-710 Missing Validation
Posted May 24, 2021
Authored by Prithwish Kumar Pal

D-Link DWR-710 is missing server-side controls to ensure that null passwords are not set.

tags | exploit
MD5 | 5717830371e0d6041068af465dd03904
Page 1 of 1
Back1Next

File Archive:

January 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    0 Files
  • 3
    Jan 3rd
    20 Files
  • 4
    Jan 4th
    4 Files
  • 5
    Jan 5th
    37 Files
  • 6
    Jan 6th
    20 Files
  • 7
    Jan 7th
    4 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    0 Files
  • 10
    Jan 10th
    18 Files
  • 11
    Jan 11th
    8 Files
  • 12
    Jan 12th
    19 Files
  • 13
    Jan 13th
    31 Files
  • 14
    Jan 14th
    2 Files
  • 15
    Jan 15th
    2 Files
  • 16
    Jan 16th
    2 Files
  • 17
    Jan 17th
    18 Files
  • 18
    Jan 18th
    13 Files
  • 19
    Jan 19th
    15 Files
  • 20
    Jan 20th
    29 Files
  • 21
    Jan 21st
    12 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    17 Files
  • 25
    Jan 25th
    34 Files
  • 26
    Jan 26th
    23 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close