what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2022-02-11

Wireshark Analyzer 3.6.2
Posted Feb 11, 2022
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

Changes: 14 dissector vulnerabilities have been fixed. 15 additional bug fixes were added.
tags | tool, sniffer, protocol
systems | windows, unix
SHA-256 | 5d901a5572aef953f04adc253ed2a0699d4c62779d3249021e1e8541a024c30e
nfstream 6.4.2
Posted Feb 11, 2022
Authored by Zied Aouini | Site github.com

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

Changes: Fix for pypi missing wheels.
tags | tool, python
systems | unix
SHA-256 | 7886ae6f181bdaea3668f70071354538267f76d5825c5ae055822fc0bab3518d
SIEMENS-SINEMA Remote Connect 1.0 SP3 HF1 Open Redirection
Posted Feb 11, 2022
Authored by A. Ovsyannikova | Site sec-consult.com

SIEMENS-SINEMA Remote Connect version 1.0 SP3 HF1 suffers from an open redirection vulnerability.

tags | exploit, remote
advisories | CVE-2022-23102
SHA-256 | 2025fbf79c79ed214e16d6403fd3fd60fe1acdc9c72cd918baa2eba0b4448e75
Red Hat Security Advisory 2022-0507-01
Posted Feb 11, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0507-01 - Red Hat JBoss Data Virtualization is a lean data integration solution that provides easy, real-time, and unified data access across disparate sources to multiple applications and users. JBoss Data Virtualization makes data spread across physically distinct systems - such as multiple databases, XML files, and even Hadoop systems - appear as a set of tables in a local database. This Service Pack release of Red Hat JBoss Data Virtualization 6.4.8.SP2 serves as a replacement for Red Hat JBoss Data Virtualization 6.4.8 and Red Hat JBoss Data Virtualization 6.4.8.SP1, and mitigates the impact of the log4j CVE's referenced in this document by removing the affected classes from the patch. Issues addressed include code execution, deserialization, and remote SQL injection vulnerabilities.

tags | advisory, remote, local, vulnerability, code execution, sql injection
systems | linux, redhat
advisories | CVE-2019-17571, CVE-2020-9488, CVE-2021-4104, CVE-2022-23302, CVE-2022-23305, CVE-2022-23307
SHA-256 | fbe91d1bc3ed2e3fbb1fa5ff2f36ba68eca8d2c1b922285bb6706923bbca97ff
Nokia Transport Module Authentication Bypass
Posted Feb 11, 2022
Authored by Cristiano Maruti

The TRS web console allows an authenticated user to remotely manage the BTS and its configuration. Analysis discovered an authentication bypass vulnerability in the web management console. BTS TRS web console version FTM_W20_FP2_2019.08.16_0010 is affected.

tags | exploit, web, bypass
advisories | CVE-2021-31932
SHA-256 | 0f05d6d716250f586c5ca2543716a3b108e48fdb98ec32ec187a2d7388c7a043
Apple Security Advisory 2022-02-10-3
Posted Feb 11, 2022
Authored by Apple | Site apple.com

Apple Security Advisory 2022-02-10-3 - Safari 15.3 addresses code execution and use-after-free vulnerabilities.

tags | advisory, vulnerability, code execution
systems | apple
advisories | CVE-2022-22620
SHA-256 | 9aff010cc56a76b1b22923fd7d12695f4a47ceb08cf3182a39a9c990d7386dc7
Subrion CMS 4.2.1 Cross Site Request Forgery
Posted Feb 11, 2022
Authored by Aryan Chehreghani

Subrion CMS version 4.2.1 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 6e6c416fadc87a9d274f7f783f9c8782d76e31148c30267089cca8b546eb9276
Apple Security Advisory 2022-02-10-2
Posted Feb 11, 2022
Authored by Apple | Site apple.com

Apple Security Advisory 2022-02-10-2 - macOS Monterey 12.2.1 addresses code execution and use-after-free vulnerabilities.

tags | advisory, vulnerability, code execution
systems | apple
advisories | CVE-2022-22620
SHA-256 | 9fac97c54283008502dbdac653d4628b25e4e78862914e9f22aa5ded59aa2435
Accounting Journal Management System 1.0 SQL Injection
Posted Feb 11, 2022
Authored by Alperen Ergel

Accounting Journal Management System version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | f5f528b8f4842123c6d93dbd73e398622f44bb7962173ba773ffa8e13f9f8d05
Apple Security Advisory 2022-02-10-1
Posted Feb 11, 2022
Authored by Apple | Site apple.com

Apple Security Advisory 2022-02-10-1 - iOS 15.3.1 and iPadOS 15.3.1 addresses code execution and use-after-free vulnerabilities.

tags | advisory, vulnerability, code execution
systems | apple, ios
advisories | CVE-2022-22620
SHA-256 | ffb44aa673eb6c378b3be0dc9f7e1c638db809cb42bdd28efcb80d8ac8a39680
Kyocera Command Center RX ECOSYS M2035dn Directory Traversal
Posted Feb 11, 2022
Authored by Luis Martinez

Kyocera Command Center RX version ECOSYS M2035dn suffers from a directory traversal vulnerability that allows for file disclosure.

tags | exploit, file inclusion
SHA-256 | 89cfa42fe3449bfdce8a9117af9911c0470fdb7b8987a421e59b7dbeadeeebde
ICICS 2022 Call For Papers
Posted Feb 11, 2022
Site cyber.kent.ac.uk

The call for papers for the 24th International Conference on Information and Communications Security (ICICS 2022) has been announced. It will take place at the University of Kent, Canterbury, UK on September 5th through the 8th, 2022.

tags | paper, conference
SHA-256 | c5858f9c626e3726677487db4f6dd8a236b35385ed21c9145dda99e6fcb0a1d3
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    0 Files
  • 7
    Mar 7th
    0 Files
  • 8
    Mar 8th
    0 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    0 Files
  • 14
    Mar 14th
    0 Files
  • 15
    Mar 15th
    0 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close