exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2021-10-01

Falco 0.30.0
Posted Oct 1, 2021
Authored by Sysdig | Site sysdig.org

Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

Changes: 3 major changes. 3 minor changes. 2 bug fixes. 2 rule changes. 8 non-user facing changes.
tags | tool, intrusion detection
systems | unix
SHA-256 | 9d90a86752a700dad2d1ea888b2cd33cdc808621faa2b6300bb0463d404744fb
SQLMAP - Automatic SQL Injection Tool 1.5.10
Posted Oct 1, 2021
Authored by Bernardo Damele | Site sqlmap.org

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Changes: Minor release with no notes in the changelog.
tags | tool, web, overflow, arbitrary, vulnerability, sql injection
systems | unix
SHA-256 | 7147ba8c9ac98fe55daa4928c34f7b6e314bfa7fa60a4f073689f70533128bcb
Packet Storm New Exploits For September, 2021
Posted Oct 1, 2021
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 169 exploits added to Packet Storm in September, 2021.

tags | exploit
SHA-256 | 2d5335d8a4719b57986a4b6b030b83b25c923ac73802cc371f160375e3b46e97
Red Hat Security Advisory 2021-3646-01
Posted Oct 1, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-3646-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-25741
SHA-256 | b7f83a250af312bf31fa5032a238f15f79c627c5609e6722afefe20f3e59aeca
Ubuntu Security Notice USN-5094-2
Posted Oct 1, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 5094-2 - It was discovered that the KVM hypervisor implementation in the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. An attacker who could start and control a VM could possibly use this to expose sensitive information or execute arbitrary code. It was discovered that the tracing subsystem in the Linux kernel did not properly keep track of per-cpu ring buffer state. A privileged attacker could use this to cause a denial of service. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, kernel
systems | linux, ubuntu
advisories | CVE-2021-22543, CVE-2021-3679, CVE-2021-3732, CVE-2021-38204, CVE-2021-38205
SHA-256 | d31622e283cd38f8cb186bd7afe5560894a41bd02dd928f9715cafc78b2e7e09
WhatsUpGold 21.0.3 Cross Site Scripting
Posted Oct 1, 2021
Authored by Andreas Finstad

WhatsUpGold version 21.0.3 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2021-41318
SHA-256 | 55b88de8291761c51c5450acbd129660ffecb1a9e91858de065104793b2af57a
Blood Bank System 1.0 SQL Injection
Posted Oct 1, 2021
Authored by Nitin Sharma

Blood Bank System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | d3b75452cf8183199e7006866b99c99faca97862d311599a9f00a3a95d4dbb21
Red Hat Security Advisory 2021-3704-01
Posted Oct 1, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-3704-01 - The Advanced Virtualization module provides the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include buffer overflow, integer overflow, null pointer, out of bounds access, and out of bounds read vulnerabilities.

tags | advisory, overflow, vulnerability
systems | linux, redhat
advisories | CVE-2021-33285, CVE-2021-33286, CVE-2021-33287, CVE-2021-33289, CVE-2021-35266, CVE-2021-35267, CVE-2021-35268, CVE-2021-35269, CVE-2021-3631, CVE-2021-3667, CVE-2021-3682, CVE-2021-39251, CVE-2021-39252, CVE-2021-39253, CVE-2021-39254, CVE-2021-39255, CVE-2021-39256, CVE-2021-39257, CVE-2021-39258, CVE-2021-39259, CVE-2021-39260, CVE-2021-39261, CVE-2021-39262, CVE-2021-39263
SHA-256 | 5864f73fcab2cbaccf361eb3ef0f59a34a59c5e826c50cff47e2ad6e9a3e23bf
Phpwcms 1.9.30 Cross Site Scripting
Posted Oct 1, 2021
Authored by Okan Kurtulus

Phpwcms version 1.9.30 suffers from a cross site scripting vulnerability via the file upload functionality.

tags | exploit, xss, file upload
SHA-256 | b13080fa702d0a623b11c613c2d06c2c1b46321813ade15e2e32f9ac9fab0c42
Ubuntu Security Notice USN-5091-2
Posted Oct 1, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 5091-2 - Ofek Kirzner, Adam Morrison, Benedict Schlueter, and Piotr Krysiuk discovered that the BPF verifier in the Linux kernel missed possible mispredicted branches due to type confusion, allowing a side-channel attack. An attacker could use this to expose sensitive information. It was discovered that the tracing subsystem in the Linux kernel did not properly keep track of per-cpu ring buffer state. A privileged attacker could use this to cause a denial of service. Various other issues were also addressed.

tags | advisory, denial of service, kernel
systems | linux, ubuntu
advisories | CVE-2021-33624, CVE-2021-3679, CVE-2021-38160, CVE-2021-38199, CVE-2021-38204
SHA-256 | 8a8a2e75ddbcda95809cae2b0daa43ffa458f1fb2f6eba2572ac767c9100c9b1
Drupal MiniorangeSAML 8.x-2.22 Privilege Escalation
Posted Oct 1, 2021
Authored by Cristian Giustini

Drupal MiniorangeSAML module version 8.x-2.22 suffers from a privilege escalation vulnerability via XML Signature Wrapping.

tags | exploit
SHA-256 | 5b4fcdfda30915b9fdd670fc45af40c13ea1073e96dcd0c5fa42dee6b047b2f6
Windows/x86 nWinExec PopCalc PEB And Export Directory Table NullFree Dynamic Shellcode
Posted Oct 1, 2021
Authored by h4pp1n3ss

178 bytes small Windows/x86 shellcode that pops calc.exe. The shellcode uses the PEB method to locate the baseAddress of the required module and the Export Directory Table to locate symbols. It also uses a hash function to dynamically gather the required symbols without worry about the length. Finally, the shellcode pops the calc.exe using WinExec and exits gracefully using TerminateProcess.

tags | x86, shellcode
systems | windows
SHA-256 | 9b19277190c962885d3585247da068c374f5db74bbb693ce9cb6fe906a1118a8
Red Hat Security Advisory 2021-3703-01
Posted Oct 1, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-3703-01 - The Advanced Virtualization module provides the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include buffer overflow, integer overflow, null pointer, out of bounds access, and out of bounds read vulnerabilities.

tags | advisory, overflow, vulnerability
systems | linux, redhat
advisories | CVE-2021-33285, CVE-2021-33286, CVE-2021-33287, CVE-2021-33289, CVE-2021-3416, CVE-2021-35266, CVE-2021-35267, CVE-2021-35268, CVE-2021-35269, CVE-2021-3631, CVE-2021-3667, CVE-2021-3682, CVE-2021-39251, CVE-2021-39252, CVE-2021-39253, CVE-2021-39254, CVE-2021-39255, CVE-2021-39256, CVE-2021-39257, CVE-2021-39258, CVE-2021-39259, CVE-2021-39260, CVE-2021-39261, CVE-2021-39262, CVE-2021-39263
SHA-256 | 068ff65f70859525d3b455fd8772ae5c3f403368b8f4d1aad2358e1d98469674
Exam Form Submission System 1.0 SQL Injection
Posted Oct 1, 2021
Authored by Nitin Sharma

Exam Form Submission System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | c5221066b8b48cf8c517a4d2f33c2666c08d435d12e5a9e54444c8a06d167b76
Vehicle Service Management System 1.0 Shell Upload
Posted Oct 1, 2021
Authored by Fikrat Ghuliev

Vehicle Service Management System version 1.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | ea20560ef0ba9c5356c6ef159b3c8704e237461fabdcfa4e03534ac3e469640e
CMSimple_XH 1.7.4 Remote Command Execution
Posted Oct 1, 2021
Authored by Halit Akaydin

CMSimple_XH version 1.7.4 remote command execution exploit.

tags | exploit, remote
SHA-256 | 9a204cd68fcab96b3fa95acfa0a331437c6c63aa3ad64cc954092cb1b4d477f6
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    47 Files
  • 25
    Jul 25th
    31 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close