exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2021-10-14

WebKit DOMWindow::open Heap Use-After-Free
Posted Oct 14, 2021
Authored by Google Security Research, Glazvunov

WebKit suffers from a heap use-after-free vulnerability in DOMWindow::open.

tags | exploit
advisories | CVE-2021-30849
SHA-256 | 1ce53d65a9cc597e9e50a3e264ce0d880897dd9133738769858924fe26e913a5
WebKit EventHandler::keyEvent Heap Use-After-Free
Posted Oct 14, 2021
Authored by Google Security Research, Glazvunov

WebKit suffers from a heap use-after-free vulnerability in EventHandler::keyEvent.

tags | exploit
advisories | CVE-2021-30848
SHA-256 | 7eabdea043659a894f5b12f74294c859932c851d4c626dd836dd8073af4422d8
WebKit PointerCaptureController::processPendingPointerCapture Heap Use-After-Free
Posted Oct 14, 2021
Authored by Google Security Research, Glazvunov

WebKit suffers from a heap use-after-free vulnerability in PointerCaptureController::processPendingPointerCapture.

tags | exploit
advisories | CVE-2021-30846
SHA-256 | 6ce184daf47d381bec0f093becdd7a23020d24e4485f1163f06267303f984ecc
Yellowfin Cross Site Scripting / Insecure Direct Object Reference
Posted Oct 14, 2021
Authored by Michele Di Bonaventura

Yellowfin versions prior to 9.6.1 suffer from persistent cross site scripting and insecure direct object reference vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2021-36387, CVE-2021-36388, CVE-2021-36389
SHA-256 | a75e1219ec6542b9cd32d3ece01efb8d1aeb909324898cf57695ad502378204a
IFSC Code Finder Project 1.0 SQL Injection
Posted Oct 14, 2021
Authored by nu11secur1ty

IFSC Code Finder Project version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2021-42224
SHA-256 | 34eebf873c00c50b2ace6b2b21cf2664d6febc7f378d7e71ee9b7b381b21672e
Red Hat Security Advisory 2021-3856-01
Posted Oct 14, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-3856-01 - The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Issues addressed include a server-side request forgery vulnerability.

tags | advisory, web
systems | linux, redhat
advisories | CVE-2021-40438
SHA-256 | 21442766b306af4387511d5a671db6cbb71747bfe90874ec7ecca6f39a40e53f
TextPattern CMS 4.8.7 Shell Upload
Posted Oct 14, 2021
Authored by Mert Das

TextPattern CMS version 4.8.7 suffers from an authenticated remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | e4f760b4dcb97961d49379334bb43bec3ff76fcb8f034f03665d3aca59b918b7
Red Hat Security Advisory 2021-3851-01
Posted Oct 14, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-3851-01 - Red Hat 3scale API Management delivers centralized API management features through a distributed, cloud-hosted layer. It includes built-in features to help in building a more successful API program, including access control, rate limits, payment gateway integration, and developer experience tools. This advisory is intended to use with Container Images, for Red Hat 3scale API Management 2.11.0. Issues addressed include a cross site scripting vulnerability.

tags | advisory, xss
systems | linux, redhat
advisories | CVE-2020-8911, CVE-2020-8912, CVE-2021-22922, CVE-2021-22923, CVE-2021-22924, CVE-2021-27218, CVE-2021-3442, CVE-2021-36222, CVE-2021-3653, CVE-2021-3715, CVE-2021-37750
SHA-256 | e4888f040246d49c7a7c2e4f31bece8b08efa09009b3ee41382c5876a9bfdbbc
SolarWinds Kiwi CatTools 3.11.8 Unquoted Service Path
Posted Oct 14, 2021
Authored by Mert Das

SolarWinds Kiwi CatTools version 3.11.8 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | b3e693f9822774d43506965c835756b120fb514cb5655fe476e1718d64054662
Brute-Force Login And Bypass Account Lockout On elabFTW 1.8.5
Posted Oct 14, 2021
Authored by samguy

Whitepaper that gives an overview on brute-forcing login and bypassing account lockout on elabFTW version 1.8.5.

tags | paper, cracker
SHA-256 | 094a251f151a7eb62b59cfd2e713ac0c84510e643ec38087d3cafab6380e06e8
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close