exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2020-11-02 to 2020-11-03

Ubuntu Security Notice USN-4611-1
Posted Nov 2, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4611-1 - Steven French discovered that Samba incorrectly handled ChangeNotify permissions. A remote attacker could possibly use this issue to obtain file name information. Bas Alberts discovered that Samba incorrectly handled certain winbind requests. A remote attacker could possibly use this issue to cause winbind to crash, resulting in a denial of service. Francis Brosnan Blázquez discovered that Samba incorrectly handled certain invalid DNS records. A remote attacker could possibly use this issue to cause the DNS server to crash, resulting in a denial of service. Various other issues were also addressed.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2020-14318, CVE-2020-14323, CVE-2020-14383
SHA-256 | 50b6a7c27f354ac0c1d8d77028b90901e29fe315e929406d2422494f2552bd73
Samhain File Integrity Checker 4.4.3
Posted Nov 2, 2020
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Now allows console logging to a unix domain socket. Fixed spurious cppcheck warnings, gcc 10 compiler warning in sh_audit.c, gcc 10 compiler warning in sh_ipvx.c, gcc 10 compile problem in sh_tiger1_64.c, and gcc 10 compiler warning in sh_portcheck.c.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | d39dd235b20123b43fb5cee5acd54edcf69e396c79fe833b6d59d98be7c3c7e9
SQLMAP - Automatic SQL Injection Tool 1.4.11
Posted Nov 2, 2020
Authored by Bernardo Damele | Site sqlmap.org

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Changes: Bug fixes.
tags | tool, web, overflow, arbitrary, vulnerability, sql injection
systems | unix
SHA-256 | 80cc07e08cc7e9662c6b8ce99fd3ae8706458b8009c56369dbb1f57b3b6634c5
Packet Storm New Exploits For October, 2020
Posted Nov 2, 2020
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 154 exploits added to Packet Storm in October, 2020.

tags | exploit
SHA-256 | b5cfc872c238a61ff5883d14c4a76378974806ddf56ff456ce4fb59e34b2c367
WordPress Simple File List 5.4 Shell Upload
Posted Nov 2, 2020
Authored by H4rk3nz0

WordPress Simple File List plugin version 5.4 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | b6d82218d0df472d65a5d494c1d69fb41b45f32557c4cc264981441b60469b07
Multi Restaurant Table Reservation System 1.0 SQL Injection
Posted Nov 2, 2020
Authored by yunaranyancat

Multi Restaurant Table Reservation System version 1.0 suffers from an unauthenticated remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 2071310279def3d23ba0ce602c8265274777ed32c9f3792d1ab4763f2aee8cc3
Multi Restaurant Table Reservation System 1.0 Cross Site Scripting
Posted Nov 2, 2020
Authored by yunaranyancat

Multi Restaurant Table Reservation System version 1.0 suffers from multiple persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | d89b16c70cef2c278a312fb7085b95a157aa530375424a0d44c73275188db1e8
Monitorr 1.7.6m Authorization Bypass
Posted Nov 2, 2020
Authored by Simon Lyhin

Monitorr version 1.7.6m suffers from an authorization bypass vulnerability.

tags | exploit, bypass
SHA-256 | b58f16284ec1093bea1656c90a5e5aaeb04539828bb4128ae4571e8f32c27e14
Monitorr 1.7.6m Remote Code Execution
Posted Nov 2, 2020
Authored by Simon Lyhin

Monitorr version 1.7.6m suffers from an unauthenticated remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | 2dec5b27b3362abcc1abe3c0b5f46108fbb55c4f2b8d9f21cc500e2a14380d23
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close