exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 24 of 24 RSS Feed

Files Date: 2022-03-21

ICT Protege GX/WX 2.08 Client-Side SHA1 Password Hash Disclosure
Posted Mar 21, 2022
Authored by LiquidWorm | Site zeroscience.mk

ICT Protege GX/WX version 2.08 suffers from a client-side SHA1 password hash disclosure vulnerability.

tags | exploit
SHA-256 | f203bc1b35e3b9d44818d0680ff7a367ed1eac4fa488fe060a5c8a1fec93d479
ICT Protege GX/WX 2.08 Cross Site Scripting
Posted Mar 21, 2022
Authored by LiquidWorm | Site zeroscience.mk

ICT Protege GX/WX version 2.08 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 0761967ed7f26d12def00046c1c81a51292379f6aee38f2875fd95654cb59e1a
OX App Suite 7.10.5 Cross Site Scripting
Posted Mar 21, 2022
Authored by Martin Heiland

OX App Suite versions 7.10.5 and below suffer from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2021-44208, CVE-2021-44209, CVE-2021-44210, CVE-2021-44211, CVE-2021-44212, CVE-2021-44213
SHA-256 | 439326d231827e72e3d0872c060c5c62dddd34691c556c0825bfa59c8c7f1d96
Linux ax88179_rx_fixup() Out-Of-Bounds Access
Posted Mar 21, 2022
Authored by Jann Horn, Google Security Research

In Linux, drivers/net/usb/ax88179_178a.c contains multiple out-of-bounds accesses in ax88179_rx_fixup(), the function responsible for taking a buffer received over USB and splitting it up into ethernet packets.

tags | advisory
systems | linux
SHA-256 | d31f6a101db6dc5fd85ff3bf16404acb26c0969c2cd57cc1adc10f3d4419cf21
Ubuntu Security Notice USN-5335-1
Posted Mar 21, 2022
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 5335-1 - It was discovered that ImageMagick incorrectly handled certain values when processing XPM image data or large images. If a user or automated system using ImageMagick were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service or possibly execute code with the privileges of the user invoking the program. Suhwan Song discovered that ImageMagick incorrectly handled memory when processing PNG,PALM,MIFF image data. If a user or automated system using ImageMagick were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service or possibly execute code with the privileges of the user invoking the program.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2017-13144, CVE-2020-25674, CVE-2020-27760, CVE-2020-27766, CVE-2020-27770, CVE-2021-20176
SHA-256 | d71ef36c95a343d18886a6914e5af77ad30344146938b827f9f916138328f31c
3CX Phone System Cleartext Passwords
Posted Mar 21, 2022
Authored by Emanuel Duss

The 3CX Phone System stores password in the clear as well as makes them exportable in the administration interface.

tags | advisory
advisories | CVE-2021-45491
SHA-256 | 2c1705c4372ab218a33192a0a6965c618979430b30d44e4c74099369db74b516
Poultry Farm Management System 1.0 Shell Upload
Posted Mar 21, 2022
Authored by Hejap Zairy

Poultry Farm Management System version 1.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 1ccdf023c5aaacf70fec2e0b540a1e46397ce4702e1e6cf831e5fc9903979c6f
Adversary3 1.0
Posted Mar 21, 2022
Authored by malvuln | Site malvuln.com

Adversary3 is a tool to navigate the vast www.malvuln.com malware vulnerability dataset.

tags | tool
systems | unix
SHA-256 | b3a55de6e0020ab30f2d793cc9afd88e324fe8b4fd73dc245afb8d7eed7cc19f
Ivanti Endpoint Manager CSA 4.5 / 4.6 Remote Code Execution
Posted Mar 21, 2022
Authored by D7X

Ivanti Endpoint Manager CSA versions 4.5 and 4.6 suffer from an unauthenticated remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2021-44529
SHA-256 | 6ede7e4c555086097785e7b930d3648768ced8d291ef8685bd545f55401f4bd6
Red Hat Security Advisory 2022-0860-01
Posted Mar 21, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0860-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.9.25. Issues addressed include a code execution vulnerability.

tags | advisory, code execution
systems | linux, redhat
advisories | CVE-2022-0811
SHA-256 | 9e03d7da0e1a0333a90a2d45a7990487c3544cafe858c8faae9e01c6d2cee16d
Xlight FTP 3.9.3.2 Buffer Overflow
Posted Mar 21, 2022
Authored by Hejap Zairy

Xlight FTP version 3.9.3.2 SEH buffer overflow exploit with egghunter and ROP.

tags | exploit, overflow
SHA-256 | 8a25a3e8400b103e1968bb06bba284c8aee75861e8f8d35933431637c668ae69
Amazing CD Ripper 1.2 Buffer Overflow
Posted Mar 21, 2022
Authored by Hejap Zairy

Amazing CD Ripper version 1.2 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 6aea2dcb49612881d03edb658c59771baf00b1b0d1b8f85077733c4b5f4402dd
Red Hat Security Advisory 2022-0968-01
Posted Mar 21, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0968-01 - IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 8 to version 8 SR7-FP5. Issues addressed include deserialization and integer overflow vulnerabilities.

tags | advisory, java, overflow, vulnerability
systems | linux, redhat
advisories | CVE-2021-35550, CVE-2021-35603, CVE-2022-21248, CVE-2022-21293, CVE-2022-21294, CVE-2022-21340, CVE-2022-21341, CVE-2022-21360, CVE-2022-21365
SHA-256 | a30212491ea4821b7fde0bcaf4a2db6f6f9a910c995fa137ace8429ca59bce8c
Home Owners Collection Management System 1.0 SQL Injection
Posted Mar 21, 2022
Authored by Hejap Zairy

Home Owners Collection Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for remote code execution.

tags | exploit, remote, code execution, sql injection
SHA-256 | 33d94e2ce6a5ef29774f363c1fcdc202217913a434a7dd410cf6aa45bb79454c
Red Hat Security Advisory 2022-0927-01
Posted Mar 21, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0927-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.5.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-44716, CVE-2021-44717
SHA-256 | a0d76368062abcbab0539a589880d0597447336eb01ae69a1c42ba383dccd5f2
3CX Client Missing TLS Validation
Posted Mar 21, 2022
Authored by Emanuel Duss

The 3CX Client for Windows (legacy), Android, and iOS fails to properly validate TLS certificates.

tags | advisory
systems | windows, ios
advisories | CVE-2021-45490
SHA-256 | 074017ebf0abca4d37a8b67b240f167c0bec4bbfda44f67fe65cc2c9c71455a1
Red Hat Security Advisory 2022-0969-01
Posted Mar 21, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0969-01 - IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 7 to version 7R1 SR5-FP5. Issues addressed include deserialization and integer overflow vulnerabilities.

tags | advisory, java, overflow, vulnerability
systems | linux, redhat
advisories | CVE-2021-35550, CVE-2021-35603, CVE-2022-21248, CVE-2022-21293, CVE-2022-21294, CVE-2022-21340, CVE-2022-21341, CVE-2022-21360, CVE-2022-21365
SHA-256 | 884c9441bde958f07d32536259e6bf0dbacffd55c6cd665bf1c4686c67cbedaa
Inventory Management System 1.0 SQL Injection
Posted Mar 21, 2022
Authored by Hejap Zairy

Inventory Management System version 1.0 suffers from a remote SQL injection vulnerability that can be leveraged to gain remote code execution.

tags | exploit, remote, code execution, sql injection
SHA-256 | 7cc6ee4181b5d5e52b0cc23898c1315185ae2b4a6cc52d71a24a83564cddffa4
Inventory Management System 1.0 Cross Site Scripting
Posted Mar 21, 2022
Authored by Hejap Zairy

Inventory Management System version 1.0 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | d8fd3b61af8814c5fe9d16c0f05edbe981b0fa8bac9d1cdbe15895f9bdf06941
Red Hat Security Advisory 2022-0971-01
Posted Mar 21, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0971-01 - The Advanced Virtualization module provides the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include a privilege escalation vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2022-0358, CVE-2022-0485
SHA-256 | e0172eabb0bff4bd40800e07cc360c2ad20abbdbb8f21b9a802a577f6ff8bf97
Red Hat Security Advisory 2022-0973-01
Posted Mar 21, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0973-01 - Kernel-based Virtual Machine offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Issues addressed include a privilege escalation vulnerability.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2022-0358
SHA-256 | 67e782c7e79ed0b94a3980575dbe5a80344c76be79c06747974950a2c882747d
WordPress iQ Block Country 1.2.13 Arbitrary File Deletion
Posted Mar 21, 2022
Authored by Ceylan Bozogullarindan

WordPress iQ Block Country plugin version 1.2.13 suffers from an arbitrary file deletion vulnerability.

tags | exploit, arbitrary
advisories | CVE-2022-0246
SHA-256 | f0010d1dc3064386061b5ec573e0ad6624d9a232d481f124beeca9af833a6844
SAP Knowledge Warehouse 7.50 / 7.40 / 7.31 / 7.30 Cross Site Scripting
Posted Mar 21, 2022
Authored by Julien Ahrens | Site rcesecurity.com

SAP Knowledge Warehouse versions 7.30, 7.31, 7.40, and 7.50 suffer from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2021-42063
SHA-256 | 3cdb75beff9ad13b8fd31c0196339aaa4bd2eba05bc62d3ddf8e67c54c8cf3a8
Red Hat Security Advisory 2022-0970-01
Posted Mar 21, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0970-01 - IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 8 to version 8 SR7-FP5. Issues addressed include deserialization and integer overflow vulnerabilities.

tags | advisory, java, overflow, vulnerability
systems | linux, redhat
advisories | CVE-2021-35550, CVE-2021-35603, CVE-2022-21248, CVE-2022-21293, CVE-2022-21294, CVE-2022-21340, CVE-2022-21341, CVE-2022-21360, CVE-2022-21365
SHA-256 | 14ad386d2ad8d88c80409f5d366b55521907fbd246e1e98fd96686120632fa70
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close