what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2021-09-03

Artica Proxy VMWare Appliance 4.30.000000 SP273 Path Traversal
Posted Sep 3, 2021
Authored by Heiko Feldhusen

Artica Proxy VMWare Appliance versions 4.30.000000 SP273 and below suffer from a path traversal vulnerability.

tags | exploit
advisories | CVE-2021-40680
SHA-256 | 7dcc4675050e13cb48b4f8260cdd2bf6677d8c485b8a55b1e18dda85bcab8b6f
Clam AntiVirus Toolkit 0.104.0
Posted Sep 3, 2021
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: Added comprehensive build instructions for using CMake to the new INSTALL.md file. The Autotools and the Visual Studio build systems have been removed. The built-in LLVM for the bytecode runtime has been removed. There are now official ClamAV images on Docker Hub. Various other updates.
tags | tool, virus
systems | unix
SHA-256 | a079d64cd55d6184510adfe0f341b2f278f7fb1bcc080d28d374298160f19cb2
SQLMAP - Automatic SQL Injection Tool 1.5.9
Posted Sep 3, 2021
Authored by Bernardo Damele | Site sqlmap.org

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Changes: Minor release with no notes in the changelog.
tags | tool, web, overflow, arbitrary, vulnerability, sql injection
systems | unix
SHA-256 | 3e8516e268ffc6983ff522f7d5a73327e2ad0156c256d713ba046a4b7df3ef94
nfstream 6.3.4
Posted Sep 3, 2021
Authored by Zied Aouini | Site github.com

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

Changes: Fixed transport_size value. Fixed requirements on MacOS and PyPy. Updated dependencies (libgcrypt). Maintenance update of nDPI.
tags | tool, python
systems | unix
SHA-256 | 459699e449fa6f1b8144b6c0c6911e5cd42a279bf935fd0f79b703578d968f7c
OpenSIS 8.0 Directory Traversal
Posted Sep 3, 2021
Authored by Eric Salario

OpenSIS version 8.0 suffers from a local file inclusion vulnerability via a path traversal.

tags | exploit, local, file inclusion
SHA-256 | b4604799c3d68f5a861c1059982a38647541f7bed5db2a009a480a31ae65fd13
Remote Mouse 4.002 Unquoted Service Path
Posted Sep 3, 2021
Authored by Salman Asad

Remote Mouse version 4.002 suffers from an unquoted service path vulnerability.

tags | exploit, remote
SHA-256 | bcb4747ade697c342b7fd35a1f94db8e7b7b0a223edbc30af905eda08d6766c0
jforum 2.7.0 Cross Site Scripting
Posted Sep 3, 2021
Authored by Kun Song

jforum version 2.7.0 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2021-40509
SHA-256 | 8186b86b44ca5831f490796776b03ab913d8eccc2499f1b3e91f180e21abdb84
BRAKTOOTH: Causing Havoc On Bluetooth Link Manager
Posted Sep 3, 2021
Authored by Vaibhav Bedi, Matheus E. Garbelini, Ernest Kurniawan, Sudipta Chattopadhyay, Sumei Sun | Site asset-group.github.io

This whitepaper discusses BRAKTOOTH, a family of new security vulnerabilities in commercial BT stacks that range from denial of service (DoS) via firmware crashes and deadlocks in commodity hardware to arbitrary code execution (ACE) in certain IoTs.

tags | advisory, paper, denial of service, arbitrary, vulnerability, code execution
advisories | CVE-2021-28135, CVE-2021-28136, CVE-2021-28139, CVE-2021-28155, CVE-2021-31609, CVE-2021-31610, CVE-2021-31611, CVE-2021-31612, CVE-2021-31613, CVE-2021-31717, CVE-2021-31785, CVE-2021-31786, CVE-2021-34143, CVE-2021-34144, CVE-2021-34145, CVE-2021-34146, CVE-2021-34147, CVE-2021-34148, CVE-2021-34149, CVE-2021-34150
SHA-256 | ec29de4f145eee5ced7ab6a0c5389c72ee16a987352a4373d9ef5da684cef2ac
Windows Defender Application Guard Denial Of Service
Posted Sep 3, 2021
Authored by Jonathan Gregson

Windows Defender Application Guard suffers from a denial of service vulnerability when fed an overly long url.

tags | exploit, denial of service
systems | windows
SHA-256 | cf6fbae0f46c7ecf6f3a378279c36634a187e9ffa942b97b8e719b6966a01e0b
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    14 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close