exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2021-06-08

Red Hat Security Advisory 2021-2291-01
Posted Jun 8, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2291-01 - The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-30465
SHA-256 | 7a856263ba9fa137ae95cff9bcf0a3e7b7a5977f6bcf668df9a819046fb4db79
Red Hat Security Advisory 2021-2292-01
Posted Jun 8, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2292-01 - The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-30465
SHA-256 | 8cb1cdec882b94663495dd31dcb1227a255922ebabecd056e90f016b82eecc5b
SQLMAP - Automatic SQL Injection Tool 1.5.6
Posted Jun 8, 2021
Authored by Bernardo Damele | Site sqlmap.org

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Changes: Minor release with no notes in the changelog.
tags | tool, web, overflow, arbitrary, vulnerability, sql injection
systems | unix
SHA-256 | adc5feaf873ca6f50d4a1f3cf9d047b20c4e12733355528acb467926c6c375f1
COVID-19 Testing Management System 1.0 SQL Injection
Posted Jun 8, 2021
Authored by nu11secur1ty

COVID-19 Testing Management System version 1.0 remote SQL injection exploit based upon the original discovery by Rohit Burke in May of 2021.

tags | exploit, remote, sql injection
advisories | CVE-2021-33470
SHA-256 | 0a0103bf0a7eac9dcea23976913fe85ee3e02bab59a17d48ed4103f626bfc8c4
Red Hat Security Advisory 2021-2290-01
Posted Jun 8, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2290-01 - nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.

tags | advisory, web, protocol
systems | linux, redhat
advisories | CVE-2021-23017
SHA-256 | 1651d0dd6c4d8e6407c692a21c98162f056535fdccc533aa9812afe1ddf2044f
WordPress wpDiscuz 7.0.4 Remote Code Execution
Posted Jun 8, 2021
Authored by Fellipe Oliveira

WordPress wpDiscuz plugin version 7.0.4 unauthenticated remote code execution exploit.

tags | exploit, remote, code execution
advisories | CVE-2020-24186
SHA-256 | aa63e68f2bfdeedda7921d223b7b89c35603743db979d8834247d72fc6863c1e
Red Hat Security Advisory 2021-2285-01
Posted Jun 8, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2285-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2021-3347
SHA-256 | fc3dcdcc018fc8b3d555175305ab4701676cf4330fa406d94eb512b7148d1a43
How To Find WordPress Plugin Vulns
Posted Jun 8, 2021
Authored by WPScan | Site wpscan.com

This e-book gives an overview of how to approach assessing WordPress plugins for vulnerabilities and common vectors of attack.

tags | paper, vulnerability
SHA-256 | e66d1b3feb40251693712a7381b3bf18fb112a40e5a99d570e55530e8cadfbfa
SAMI FTP Server 2.0.2 Denial Of Service
Posted Jun 8, 2021
Authored by Fernando Mengali

SAMI FTP server version 2.0.2 USER denial of service exploit.

tags | exploit, denial of service
SHA-256 | 25a4a57d6e3e422c4340c8395e9311a2f0730affee280f28bc5b0991b67ac307
Red Hat Security Advisory 2021-2280-01
Posted Jun 8, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2280-01 - Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space.

tags | advisory, kernel, cryptography, python
systems | linux, redhat
advisories | CVE-2021-20305
SHA-256 | 25a368fa3e5e2ba5618296e78e07cf7dddc9a96c8c3b675919627a7ed133283b
Cracking pi-hole Passwords
Posted Jun 8, 2021
Authored by Salman Asad

This is a research paper that gives an overview of cracking pi-hole password hashes.

tags | paper
SHA-256 | 687155fdc445a42788cc41d3f903e89b54bbc18bb85f359808d45b10b2e51fe3
Backup Key Recovery 2.2.7 Denial Of Service
Posted Jun 8, 2021
Authored by Erick Galindo

Backup Key Recovery version 2.2.7 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 5313ee140404bec4a35ec6829e43e9c6c4d80154bedf788db495bda9fd663f93
Nsauditor 3.2.3 Denial Of Service
Posted Jun 8, 2021
Authored by Erick Galindo

Nsauditor version 3.2.3 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 1aeacf98dbebae486ebefc55c18e33f2aa97285b6c5d9cf672da18199fad725a
NBMonitor 1.6.8 Denial Of Service
Posted Jun 8, 2021
Authored by Erick Galindo

NBMonitor version 1.6.8 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | be60d91f579e33d61a9d36e23b1378d93a50d75e9ef303751a074c2f7a1baf9c
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close