exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 33 of 33 RSS Feed

Files Date: 2021-01-04 to 2021-01-05

Red Hat Security Advisory 2021-0004-01
Posted Jan 4, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0004-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow, kernel
systems | linux, redhat
advisories | CVE-2020-25211
SHA-256 | 028ee64de34e983ec3d8254cdcf7763efc9ce93bd02e9c211623229d73e4533c
Backdoor.Win32.Infexor.b MVID-2021-0010 Remote SEH Stack Buffer Overflow
Posted Jan 4, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Infexor.b malware suffers from a remote SEH stack buffer overflow vulnerability.

tags | exploit, remote, overflow
systems | windows
SHA-256 | 1638c6aafa2d5a2302a3dd2a366faeb99eb45a45a0ca28be2dbe2dd17ded3670
Resumes Management And Job Application Website 1.0 Shell Upload
Posted Jan 4, 2021
Authored by Arnav Tripathy

Resumes Management and Job Application Website version 1.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 7f8585d20569b1de5b49a34b277b0d090cb8a7bd5035afabb4fe8705326973a3
Mantis Bug Tracker 2.24.3 SQL Injection
Posted Jan 4, 2021
Authored by EthicalHCOP

Mantis Bug Tracker version 2.24.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2020-28413
SHA-256 | 3c8957612d86d7577fdde28ee21d1df81ea67d1228ac3abae6f808678afa40ae
Win32 MVID-2021-0013 Backdoor 2019-02-ARTRADOWNLOADER SEH Buffer Overflow
Posted Jan 4, 2021
Authored by malvuln | Site malvuln.com

Win32 backdoor 2019-02-ARTRADOWNLOADER suffers from a remote SEH buffer overflow vulnerability.

tags | exploit, remote, overflow
systems | windows
SHA-256 | b2138e14bfbb545a936e0f93a531841d3fd21f044775541685d107c8d0063eaa
Trojan.Win32.Antavka.bz MVID-2021-0001 Insecure Permissions / Privilege Escalation
Posted Jan 4, 2021
Authored by malvuln | Site malvuln.com

Trojan.Win32.Antavka.bz malware suffers from an insecure permissions vulnerability that can allow for privilege escalation.

tags | exploit, trojan
systems | windows
SHA-256 | 3a0c0a8c95934523df7b95cb211fb6da3e0d594dd977b28abd59f70b6efad7e7
PIMT 1.0
Posted Jan 4, 2021
Authored by Jeremy Brown | Site github.com

PIMT is a Public Infrastructure Monitoring Tool (pronounced PIM-tee). It queries common recon tools for publicly available data regarding particular organizations based on the domains and keywords provided. It is not meant to provide complete coverage for every external asset that belongs to a company as attackers usually do not have this detailed info or mapping either. One can use it to paint some sort of picture of what external attackers may be looking at, the changes occurring over time and insight for how to further harden the perimeter. The key idea being to provide valuable data to red teams as well as addition al monitoring capabilities for defenders.

tags | tool
systems | unix
SHA-256 | 4bd0c008c5efb7d3027fbd1752dcb69e6e2c963201bcecf7ea8cdbff06b2a4ea
Gotenberg 6.2.0 Traversal / Code Execution / Insecure Permissions
Posted Jan 4, 2021
Authored by Blazej Adamczyk

Gotenberg versions 6.2.0 and below suffer from directory traversal, code execution, and insecure permission vulnerabilities.

tags | exploit, vulnerability, code execution, file inclusion
advisories | CVE-2020-13449, CVE-2020-13450, CVE-2020-13451, CVE-2020-13452
SHA-256 | 78afb81c3f13565ecf21d0d3ec82d21cd97235cd78fb39359e943354ed217fce
Page 2 of 2
Back12Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close