exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2021-09-03

Artica Proxy VMWare Appliance 4.30.000000 SP273 Path Traversal
Posted Sep 3, 2021
Authored by Heiko Feldhusen

Artica Proxy VMWare Appliance versions 4.30.000000 SP273 and below suffer from a path traversal vulnerability.

tags | exploit
advisories | CVE-2021-40680
SHA-256 | 7dcc4675050e13cb48b4f8260cdd2bf6677d8c485b8a55b1e18dda85bcab8b6f
Clam AntiVirus Toolkit 0.104.0
Posted Sep 3, 2021
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: Added comprehensive build instructions for using CMake to the new INSTALL.md file. The Autotools and the Visual Studio build systems have been removed. The built-in LLVM for the bytecode runtime has been removed. There are now official ClamAV images on Docker Hub. Various other updates.
tags | tool, virus
systems | unix
SHA-256 | a079d64cd55d6184510adfe0f341b2f278f7fb1bcc080d28d374298160f19cb2
SQLMAP - Automatic SQL Injection Tool 1.5.9
Posted Sep 3, 2021
Authored by Bernardo Damele | Site sqlmap.org

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Changes: Minor release with no notes in the changelog.
tags | tool, web, overflow, arbitrary, vulnerability, sql injection
systems | unix
SHA-256 | 3e8516e268ffc6983ff522f7d5a73327e2ad0156c256d713ba046a4b7df3ef94
nfstream 6.3.4
Posted Sep 3, 2021
Authored by Zied Aouini | Site github.com

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

Changes: Fixed transport_size value. Fixed requirements on MacOS and PyPy. Updated dependencies (libgcrypt). Maintenance update of nDPI.
tags | tool, python
systems | unix
SHA-256 | 459699e449fa6f1b8144b6c0c6911e5cd42a279bf935fd0f79b703578d968f7c
OpenSIS 8.0 Directory Traversal
Posted Sep 3, 2021
Authored by Eric Salario

OpenSIS version 8.0 suffers from a local file inclusion vulnerability via a path traversal.

tags | exploit, local, file inclusion
SHA-256 | b4604799c3d68f5a861c1059982a38647541f7bed5db2a009a480a31ae65fd13
Remote Mouse 4.002 Unquoted Service Path
Posted Sep 3, 2021
Authored by Salman Asad

Remote Mouse version 4.002 suffers from an unquoted service path vulnerability.

tags | exploit, remote
SHA-256 | bcb4747ade697c342b7fd35a1f94db8e7b7b0a223edbc30af905eda08d6766c0
jforum 2.7.0 Cross Site Scripting
Posted Sep 3, 2021
Authored by Kun Song

jforum version 2.7.0 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2021-40509
SHA-256 | 8186b86b44ca5831f490796776b03ab913d8eccc2499f1b3e91f180e21abdb84
BRAKTOOTH: Causing Havoc On Bluetooth Link Manager
Posted Sep 3, 2021
Authored by Vaibhav Bedi, Matheus E. Garbelini, Ernest Kurniawan, Sudipta Chattopadhyay, Sumei Sun | Site asset-group.github.io

This whitepaper discusses BRAKTOOTH, a family of new security vulnerabilities in commercial BT stacks that range from denial of service (DoS) via firmware crashes and deadlocks in commodity hardware to arbitrary code execution (ACE) in certain IoTs.

tags | advisory, paper, denial of service, arbitrary, vulnerability, code execution
advisories | CVE-2021-28135, CVE-2021-28136, CVE-2021-28139, CVE-2021-28155, CVE-2021-31609, CVE-2021-31610, CVE-2021-31611, CVE-2021-31612, CVE-2021-31613, CVE-2021-31717, CVE-2021-31785, CVE-2021-31786, CVE-2021-34143, CVE-2021-34144, CVE-2021-34145, CVE-2021-34146, CVE-2021-34147, CVE-2021-34148, CVE-2021-34149, CVE-2021-34150
SHA-256 | ec29de4f145eee5ced7ab6a0c5389c72ee16a987352a4373d9ef5da684cef2ac
Windows Defender Application Guard Denial Of Service
Posted Sep 3, 2021
Authored by Jonathan Gregson

Windows Defender Application Guard suffers from a denial of service vulnerability when fed an overly long url.

tags | exploit, denial of service
systems | windows
SHA-256 | cf6fbae0f46c7ecf6f3a378279c36634a187e9ffa942b97b8e719b6966a01e0b
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close