exploit the possibilities
Showing 1 - 12 of 12 RSS Feed

Files Date: 2021-11-18

Wireshark Analyzer 3.4.10
Posted Nov 18, 2021
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

Changes: Large amount of bug fixes including 8 CVEs.
tags | tool, sniffer, protocol
systems | windows, unix
advisories | CVE-2021-39920, CVE-2021-39921, CVE-2021-39922, CVE-2021-39924, CVE-2021-39925, CVE-2021-39926, CVE-2021-39928, CVE-2021-39929
MD5 | 907514ab422700621a2e91196360125f
Suricata IDPE 6.0.4
Posted Nov 18, 2021
Site suricata.io

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

Changes: A couple security issues, a few dozen bugs, one feature, an optimization, and a task were addressed.
tags | tool, intrusion detection
systems | unix
MD5 | 6ef0583bbd771e80eae7d928d7735f02
Linux SO_PEERCRED / SO_PEERGROUPS Race Condition / Use-After-Free
Posted Nov 18, 2021
Authored by Jann Horn, Google Security Research

Linux suffered from a use-after-free read vulnerability related to an SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()). This has been addressed in stable versions 5.14.10, 5.10.71, 5.4.151, 4.19.209, 4.14.249, 4.4.288, and 4.9.286.

tags | exploit
systems | linux
MD5 | 814de16a8e850b47ecca6eb0680d6e00
Red Hat Security Advisory 2021-4730-02
Posted Nov 18, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-4730-02 - The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-42574
MD5 | e9a5bec04d85193193dcf80520e413f7
Red Hat Security Advisory 2021-4729-02
Posted Nov 18, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-4729-02 - Annobin provides a compiler plugin to annotate and tools to examine compiled binary files.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-42574
MD5 | 663198437446fd033012324b17068629
Ubuntu Security Notice USN-5151-1
Posted Nov 18, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 5151-1 - It was discovered that Mailman incorrectly handled certain URL. An attacker could possibly use this issue to execute arbitrary code. It was discovered that Mailman incorrectly handled certain inputs. An attacker could possibly use this issue to expose sensitive information.

tags | advisory, arbitrary
systems | linux, ubuntu
advisories | CVE-2021-43331, CVE-2021-43332
MD5 | f662149a9aa7b231b55a0e4f91231e92
Red Hat Security Advisory 2021-4725-03
Posted Nov 18, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-4725-03 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 2.6.8 images.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-25648, CVE-2021-22922, CVE-2021-22923, CVE-2021-22924, CVE-2021-29923, CVE-2021-34558, CVE-2021-36222, CVE-2021-3653, CVE-2021-3733, CVE-2021-37750
MD5 | 565e38edd21a2b32c723888429609149
Red Hat Security Advisory 2021-4722-03
Posted Nov 18, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-4722-03 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 2.6.8 RPMs.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-29923, CVE-2021-34558
MD5 | b6ff8fb2182d1670412bfee0c007d266
Red Hat Security Advisory 2021-4724-03
Posted Nov 18, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-4724-03 - Annobin provides a compiler plugin to annotate and tools to examine compiled binary files.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-42574
MD5 | 34835599d85334612ef6eff17b30a8aa
Red Hat Security Advisory 2021-4723-04
Posted Nov 18, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-4723-04 - The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-42574
MD5 | 8705b8640eb85f04088d4daf4c4d26a4
Ubuntu Security Notice USN-5150-1
Posted Nov 18, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 5150-1 - It was discovered that OpenEXR incorrectly handled certain EXR image files. An attacker could possibly use this issue to cause a crash.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2021-3941
MD5 | e57ef302fb93bb3de94446102cfe5d40
WordPress Preview E-mails For WooCommerce 1.6.8 Cross Site Scripting
Posted Nov 18, 2021
Authored by Chloe Chamberland | Site wordfence.com

WordPress Preview E-mails for WooCommerce plugin versions 1.6.8 and below suffer from a cross site scripting vulnerability.

tags | advisory, xss
advisories | CVE-2021-42363
MD5 | c46da50d03a7e43bbff2b3dc283f9317
Page 1 of 1
Back1Next

File Archive:

December 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    18 Files
  • 2
    Dec 2nd
    11 Files
  • 3
    Dec 3rd
    23 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close