what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2021-10-14

WebKit DOMWindow::open Heap Use-After-Free
Posted Oct 14, 2021
Authored by Google Security Research, Glazvunov

WebKit suffers from a heap use-after-free vulnerability in DOMWindow::open.

tags | exploit
advisories | CVE-2021-30849
SHA-256 | 1ce53d65a9cc597e9e50a3e264ce0d880897dd9133738769858924fe26e913a5
WebKit EventHandler::keyEvent Heap Use-After-Free
Posted Oct 14, 2021
Authored by Google Security Research, Glazvunov

WebKit suffers from a heap use-after-free vulnerability in EventHandler::keyEvent.

tags | exploit
advisories | CVE-2021-30848
SHA-256 | 7eabdea043659a894f5b12f74294c859932c851d4c626dd836dd8073af4422d8
WebKit PointerCaptureController::processPendingPointerCapture Heap Use-After-Free
Posted Oct 14, 2021
Authored by Google Security Research, Glazvunov

WebKit suffers from a heap use-after-free vulnerability in PointerCaptureController::processPendingPointerCapture.

tags | exploit
advisories | CVE-2021-30846
SHA-256 | 6ce184daf47d381bec0f093becdd7a23020d24e4485f1163f06267303f984ecc
Yellowfin Cross Site Scripting / Insecure Direct Object Reference
Posted Oct 14, 2021
Authored by Michele Di Bonaventura

Yellowfin versions prior to 9.6.1 suffer from persistent cross site scripting and insecure direct object reference vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2021-36387, CVE-2021-36388, CVE-2021-36389
SHA-256 | a75e1219ec6542b9cd32d3ece01efb8d1aeb909324898cf57695ad502378204a
IFSC Code Finder Project 1.0 SQL Injection
Posted Oct 14, 2021
Authored by nu11secur1ty

IFSC Code Finder Project version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2021-42224
SHA-256 | 34eebf873c00c50b2ace6b2b21cf2664d6febc7f378d7e71ee9b7b381b21672e
Red Hat Security Advisory 2021-3856-01
Posted Oct 14, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-3856-01 - The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Issues addressed include a server-side request forgery vulnerability.

tags | advisory, web
systems | linux, redhat
advisories | CVE-2021-40438
SHA-256 | 21442766b306af4387511d5a671db6cbb71747bfe90874ec7ecca6f39a40e53f
TextPattern CMS 4.8.7 Shell Upload
Posted Oct 14, 2021
Authored by Mert Das

TextPattern CMS version 4.8.7 suffers from an authenticated remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | e4f760b4dcb97961d49379334bb43bec3ff76fcb8f034f03665d3aca59b918b7
Red Hat Security Advisory 2021-3851-01
Posted Oct 14, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-3851-01 - Red Hat 3scale API Management delivers centralized API management features through a distributed, cloud-hosted layer. It includes built-in features to help in building a more successful API program, including access control, rate limits, payment gateway integration, and developer experience tools. This advisory is intended to use with Container Images, for Red Hat 3scale API Management 2.11.0. Issues addressed include a cross site scripting vulnerability.

tags | advisory, xss
systems | linux, redhat
advisories | CVE-2020-8911, CVE-2020-8912, CVE-2021-22922, CVE-2021-22923, CVE-2021-22924, CVE-2021-27218, CVE-2021-3442, CVE-2021-36222, CVE-2021-3653, CVE-2021-3715, CVE-2021-37750
SHA-256 | e4888f040246d49c7a7c2e4f31bece8b08efa09009b3ee41382c5876a9bfdbbc
SolarWinds Kiwi CatTools 3.11.8 Unquoted Service Path
Posted Oct 14, 2021
Authored by Mert Das

SolarWinds Kiwi CatTools version 3.11.8 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | b3e693f9822774d43506965c835756b120fb514cb5655fe476e1718d64054662
Brute-Force Login And Bypass Account Lockout On elabFTW 1.8.5
Posted Oct 14, 2021
Authored by samguy

Whitepaper that gives an overview on brute-forcing login and bypassing account lockout on elabFTW version 1.8.5.

tags | paper, cracker
SHA-256 | 094a251f151a7eb62b59cfd2e713ac0c84510e643ec38087d3cafab6380e06e8
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close