exploit the possibilities
Showing 1 - 20 of 20 RSS Feed

Files Date: 2022-01-03

Haveged 1.9.16
Posted Jan 3, 2022
Site issihosts.com

haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.

Changes: Now allows newuname syscall. Fixed an issue where haveged cannot be run as an application if also running as a daemon. Added entropy unconditionally at the start and then every 60 seconds. New parameter --once to refill entropy once and quit immediately. Added haveged-once.service to provide entropy once (intended for initramfs).
tags | tool
systems | linux, unix
MD5 | f3de87cbd4ebcbbd47b236d5c5c4c56f
SQLMAP - Automatic SQL Injection Tool 1.6
Posted Jan 3, 2022
Authored by Bernardo Damele | Site sqlmap.org

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Changes: Major release bump with a large list of changes over the past year.
tags | tool, web, overflow, arbitrary, vulnerability, sql injection
systems | unix
MD5 | bb815d35262e6b1362216f954b292719
Wireshark Analyzer 3.6.1
Posted Jan 3, 2022
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

Changes: Six vulnerabilities related to crashes and infinite loops have been addressed. Eleven bug fixes as well as significant updates relating to protocol support.
tags | tool, sniffer, protocol
systems | windows, unix
advisories | CVE-2021-4181, CVE-2021-4182, CVE-2021-4183, CVE-2021-4184, CVE-2021-4185
MD5 | ac3f49fbef232264aa9b4f8426691b04
Zoom MMR Server Information Leak
Posted Jan 3, 2022
Authored by Google Security Research, natashenka

Zoom suffers from an information leak vulnerability in the MMR server.

tags | exploit
advisories | CVE-2021-34424
MD5 | a1a7ee497b8b7df8379e96cb3d4ae80a
Red Hat Security Advisory 2022-0003-03
Posted Jan 3, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0003-03 - X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Issues addressed include an out of bounds access vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-4008, CVE-2021-4009, CVE-2021-4010, CVE-2021-4011
MD5 | e9293f229a00169ea6eada5cad06121c
Zoom Chat Message Processing Buffer Overflow
Posted Jan 3, 2022
Authored by Google Security Research, natashenka

Zoom suffers from a buffer overflow vulnerability related to the processing of chat message.

tags | exploit, overflow
advisories | CVE-2021-34423
MD5 | e546f41250fa0f94c7fcc6018501de40
Red Hat Security Advisory 2022-0001-01
Posted Jan 3, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0001-01 - Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-44716
MD5 | 7cf7b068c112fd344d92d4bdae07d0a0
Backdoor.Win32.SilentSpy.10 Authentication Race Condition
Posted Jan 3, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.SilentSpy.10 malware suffers from an authentication related race condition vulnerability.

tags | exploit
systems | windows
MD5 | 412679ee01d950c32552e4b058c9e84c
WordPress CRM Form Entries Cross Site Scripting
Posted Jan 3, 2022
Authored by Gaetano Perrone | Site secsi.io

WordPress CRM Form Entries versions prior to 1.1.7 appear susceptible to a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2021-25080
MD5 | f4e7025814603e6db8a25b7d889c817b
Backdoor.Win32.SilentSpy.10 Authentication Bypass / Command Execution
Posted Jan 3, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.SilentSpy.10 malware suffers from authentication bypass and command execution vulnerabilities.

tags | exploit, vulnerability
systems | windows
MD5 | a94cc9d13e354dfd764a2fd45f57580e
Backdoor.Win32.Skrat Insecure Password Storage
Posted Jan 3, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Skrat malware suffers from an insecure password storage vulnerability.

tags | exploit
systems | windows
MD5 | 4dc42f5ee58d7f535de622b2abf04f40
Red Hat Security Advisory 2022-0002-01
Posted Jan 3, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0002-01 - Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-44716
MD5 | 9c9d3d599913df233141e2f337fdf2fe
Backdoor.Win32.Fantador Denial Of Service
Posted Jan 3, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Fantador malware suffers from a denial of service vulnerability.

tags | exploit, denial of service
systems | windows
MD5 | c43a15a575a4c521a374c60c09eadeb5
Backdoor.Win32.Fantador Insecure Password Storage
Posted Jan 3, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Fantador malware suffers from an insecure password storage vulnerability.

tags | exploit
systems | windows
MD5 | b5dd0e3572fe7f9a68928b65d4d56edd
BeyondTrust Remote Support 6.0 Cross Site Scripting
Posted Jan 3, 2022
Authored by Malcrove

BeyondTrust Remote Support versions 6.0 and below suffer from a cross site scripting vulnerability.

tags | exploit, remote, xss
advisories | CVE-2021-31589
MD5 | 7c2a53ee95de59d4c8d51c620bdd9f70
Backdoor.Win32.Wollf.m Authentication Bypass
Posted Jan 3, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Wollf.m malware suffers from a bypass vulnerability.

tags | exploit, bypass
systems | windows
MD5 | ffa3491cb5e17da83dcbcb1ecf3fda43
Backdoor.Win32.Wollf.m Weak Hardcoded Password
Posted Jan 3, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Wollf.m malware suffers from having a weak hardcoded password.

tags | exploit
systems | windows
MD5 | f3aafcac5cfd010ab02ecaf37f1555ef
Backdoor.Win32.Jokerdoor Buffer Overflow
Posted Jan 3, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Jokerdoor malware suffers from a buffer overflow vulnerability.

tags | exploit, overflow
systems | windows
MD5 | 3ffcb769f23e171e28db37b298dc14ed
TRIGONE Remote System Monitor 3.61 Unquoted Service Path
Posted Jan 3, 2022
Authored by Yehia Elghaly

TRIGONE Remote System Monitor version 3.61 suffers from an unquoted service path vulnerability.

tags | exploit, remote
MD5 | 3463452fad0a27f3427cf59513fb07fc
Computer And Mobile Repair Shop Management 1.0 SQL Injection
Posted Jan 3, 2022
Authored by nu11secur1ty

Computer And Mobile Repair Shop Management version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | c25474e7d98558e891f792ea5d29c090
Page 1 of 1
Back1Next

File Archive:

January 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    0 Files
  • 3
    Jan 3rd
    20 Files
  • 4
    Jan 4th
    4 Files
  • 5
    Jan 5th
    37 Files
  • 6
    Jan 6th
    20 Files
  • 7
    Jan 7th
    4 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    0 Files
  • 10
    Jan 10th
    18 Files
  • 11
    Jan 11th
    8 Files
  • 12
    Jan 12th
    19 Files
  • 13
    Jan 13th
    31 Files
  • 14
    Jan 14th
    2 Files
  • 15
    Jan 15th
    2 Files
  • 16
    Jan 16th
    2 Files
  • 17
    Jan 17th
    18 Files
  • 18
    Jan 18th
    13 Files
  • 19
    Jan 19th
    15 Files
  • 20
    Jan 20th
    29 Files
  • 21
    Jan 21st
    12 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    17 Files
  • 25
    Jan 25th
    34 Files
  • 26
    Jan 26th
    23 Files
  • 27
    Jan 27th
    24 Files
  • 28
    Jan 28th
    14 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close