exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2021-06-08

Red Hat Security Advisory 2021-2291-01
Posted Jun 8, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2291-01 - The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-30465
SHA-256 | 7a856263ba9fa137ae95cff9bcf0a3e7b7a5977f6bcf668df9a819046fb4db79
Red Hat Security Advisory 2021-2292-01
Posted Jun 8, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2292-01 - The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-30465
SHA-256 | 8cb1cdec882b94663495dd31dcb1227a255922ebabecd056e90f016b82eecc5b
SQLMAP - Automatic SQL Injection Tool 1.5.6
Posted Jun 8, 2021
Authored by Bernardo Damele | Site sqlmap.org

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Changes: Minor release with no notes in the changelog.
tags | tool, web, overflow, arbitrary, vulnerability, sql injection
systems | unix
SHA-256 | adc5feaf873ca6f50d4a1f3cf9d047b20c4e12733355528acb467926c6c375f1
COVID-19 Testing Management System 1.0 SQL Injection
Posted Jun 8, 2021
Authored by nu11secur1ty

COVID-19 Testing Management System version 1.0 remote SQL injection exploit based upon the original discovery by Rohit Burke in May of 2021.

tags | exploit, remote, sql injection
advisories | CVE-2021-33470
SHA-256 | 0a0103bf0a7eac9dcea23976913fe85ee3e02bab59a17d48ed4103f626bfc8c4
Red Hat Security Advisory 2021-2290-01
Posted Jun 8, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2290-01 - nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.

tags | advisory, web, protocol
systems | linux, redhat
advisories | CVE-2021-23017
SHA-256 | 1651d0dd6c4d8e6407c692a21c98162f056535fdccc533aa9812afe1ddf2044f
WordPress wpDiscuz 7.0.4 Remote Code Execution
Posted Jun 8, 2021
Authored by Fellipe Oliveira

WordPress wpDiscuz plugin version 7.0.4 unauthenticated remote code execution exploit.

tags | exploit, remote, code execution
advisories | CVE-2020-24186
SHA-256 | aa63e68f2bfdeedda7921d223b7b89c35603743db979d8834247d72fc6863c1e
Red Hat Security Advisory 2021-2285-01
Posted Jun 8, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2285-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2021-3347
SHA-256 | fc3dcdcc018fc8b3d555175305ab4701676cf4330fa406d94eb512b7148d1a43
How To Find WordPress Plugin Vulns
Posted Jun 8, 2021
Authored by WPScan | Site wpscan.com

This e-book gives an overview of how to approach assessing WordPress plugins for vulnerabilities and common vectors of attack.

tags | paper, vulnerability
SHA-256 | e66d1b3feb40251693712a7381b3bf18fb112a40e5a99d570e55530e8cadfbfa
SAMI FTP Server 2.0.2 Denial Of Service
Posted Jun 8, 2021
Authored by Fernando Mengali

SAMI FTP server version 2.0.2 USER denial of service exploit.

tags | exploit, denial of service
SHA-256 | 25a4a57d6e3e422c4340c8395e9311a2f0730affee280f28bc5b0991b67ac307
Red Hat Security Advisory 2021-2280-01
Posted Jun 8, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2280-01 - Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space.

tags | advisory, kernel, crypto, python
systems | linux, redhat
advisories | CVE-2021-20305
SHA-256 | 25a368fa3e5e2ba5618296e78e07cf7dddc9a96c8c3b675919627a7ed133283b
Cracking pi-hole Passwords
Posted Jun 8, 2021
Authored by Salman Asad

This is a research paper that gives an overview of cracking pi-hole password hashes.

tags | paper
SHA-256 | 687155fdc445a42788cc41d3f903e89b54bbc18bb85f359808d45b10b2e51fe3
Backup Key Recovery 2.2.7 Denial Of Service
Posted Jun 8, 2021
Authored by Erick Galindo

Backup Key Recovery version 2.2.7 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 5313ee140404bec4a35ec6829e43e9c6c4d80154bedf788db495bda9fd663f93
Nsauditor 3.2.3 Denial Of Service
Posted Jun 8, 2021
Authored by Erick Galindo

Nsauditor version 3.2.3 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 1aeacf98dbebae486ebefc55c18e33f2aa97285b6c5d9cf672da18199fad725a
NBMonitor 1.6.8 Denial Of Service
Posted Jun 8, 2021
Authored by Erick Galindo

NBMonitor version 1.6.8 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | be60d91f579e33d61a9d36e23b1378d93a50d75e9ef303751a074c2f7a1baf9c
Page 1 of 1
Back1Next

File Archive:

July 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    52 Files
  • 2
    Jul 2nd
    0 Files
  • 3
    Jul 3rd
    0 Files
  • 4
    Jul 4th
    11 Files
  • 5
    Jul 5th
    8 Files
  • 6
    Jul 6th
    8 Files
  • 7
    Jul 7th
    4 Files
  • 8
    Jul 8th
    0 Files
  • 9
    Jul 9th
    0 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close