what you don't know can hurt you
Showing 1 - 11 of 11 RSS Feed

Files Date: 2021-06-18

Node.JS Remote Code Execution
Posted Jun 18, 2021
Authored by Beren Kuday Gorun

Node.JS node-serialize remote code execution exploit.

tags | exploit, remote, code execution
advisories | CVE-2017-5941
MD5 | 303b9a18cdf8ae48d3d352b481cf2786
Trojan-Dropper.Win32.Googite.b Code Execution
Posted Jun 18, 2021
Authored by malvuln | Site malvuln.com

Trojan-Dropper.Win32.Googite.b malware suffers from a code execution vulnerability.

tags | exploit, trojan, code execution
systems | windows
MD5 | 08ac018cf0391846f6f6d61aa948db7d
Ubuntu Security Notice USN-4992-1
Posted Jun 18, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4992-1 - Máté Kukri discovered that the acpi command in GRUB 2 allowed privileged users to load crafted ACPI tables when secure boot is enabled. An attacker could use this to bypass UEFI Secure Boot restrictions. Chris Coulson discovered that the rmmod command in GRUB 2 contained a use- after-free vulnerability. A local attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. Chris Coulson discovered that a buffer overflow existed in the command line parser in GRUB 2. A local attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. Various other issues were also addressed.

tags | advisory, overflow, arbitrary, local
systems | linux, ubuntu
advisories | CVE-2020-14372, CVE-2020-25632, CVE-2020-27749, CVE-2020-27779, CVE-2021-20225, CVE-2021-20233
MD5 | dff2b276f9a26bd8c18d23b8b7ad805d
Protectimus SLIM NFC Time Manipulation
Posted Jun 18, 2021
Authored by Matthias Deeg

When analyzing the Protectimus SLIM TOTP hardware token, Matthias Deeg found out that the time used by the Protectimus SLIM TOTP hardware token can be set independently from the used seed value for generating time-based one-time passwords without requiring any authentication.

tags | advisory
advisories | CVE-2021-32033
MD5 | a39659a35a3ccf91210e63de8c9355c9
iFunbox 4.2 Unquoted Service Path
Posted Jun 18, 2021
Authored by Julio Avina

iFunbox version 4.2 suffers from an unquoted service path vulnerability.

tags | exploit
MD5 | 849a704c6d76667b0b122bf70b4bbcf7
OpenEMR 5.0.1.7 Path Traversal
Posted Jun 18, 2021
Authored by Ron Jost

OpenEMR version 5.0.1.7 suffers from a path traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2019-14530
MD5 | 9b189b539433dd288cb8f97ef2d49d86
ICE Hrm 29.0.0.OS Cross Site Scripting
Posted Jun 18, 2021
Authored by Piyush Patil, Rafal Lykowski

ICE Hrm version 29.0.0.OS suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
MD5 | 467e6bc1bde72521c3f63dd3386a473c
Network Pivoting HackerEnv
Posted Jun 18, 2021
Authored by Hejap Zairy Al-Sharif

Brief whitepaper that goes through proxy, ssh, and vpn pivoting during an attack. Written in Arabic.

tags | paper
MD5 | 76a35b8e5f82c382b2cab26f4415ce03
ICE Hrm 29.0.0.OS Cross Site Request Forgery
Posted Jun 18, 2021
Authored by Piyush Patil, Rafal Lykowski

ICE Hrm version 29.0.0.OS suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | ad481616d12f28e2fa1e3372498ac806
ICE Hrm 29.0.0.OS Cross Site Scripting / Session Fixation
Posted Jun 18, 2021
Authored by Piyush Patil, Rafal Lykowski

ICE Hrm version 29.0.0.OS suffers from cross site scripting and session fixation vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 078282fa8d120a39367312e15585f560
node-serialize Remote Code Execution Web Shell
Posted Jun 18, 2021
Authored by Beren Kuday Gorun

Whitepaper called 'node-serialize' Remote Code Execution - Web Shell. Written in Turkish.

tags | paper, remote, web, shell, code execution
MD5 | 21b885a5861ff0b5f4ad35cd93e75af3
Page 1 of 1
Back1Next

File Archive:

October 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    16 Files
  • 2
    Oct 2nd
    1 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    24 Files
  • 5
    Oct 5th
    24 Files
  • 6
    Oct 6th
    11 Files
  • 7
    Oct 7th
    14 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    1 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    7 Files
  • 12
    Oct 12th
    15 Files
  • 13
    Oct 13th
    26 Files
  • 14
    Oct 14th
    10 Files
  • 15
    Oct 15th
    6 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close