exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2021-03-02 to 2021-03-03

Zeek 4.0.0
Posted Mar 2, 2021
Authored by Robin Sommer, Vern Paxson | Site zeek.org

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.

Changes: Added support for EDNS0 Cookie and Keep-Alive options. Added new Packet Analysis plugin architecture for parsing packet headers at layers below the existing Session analysis plugins. A few other additions as well as improvements to capture-loss.zeek.
tags | tool, intrusion detection
systems | unix
SHA-256 | f2eedab3262eaa3f58a83442b1f38bad35ed72399564917b71bba42266f1ff54
Suricata IDPE 6.0.2
Posted Mar 2, 2021
Site openinfosecfoundation.org

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

Changes: Fixed crashes, a leak in signature parsing with urilen, a CPU exhaustion issue, and many other bugs.
tags | tool, intrusion detection
systems | unix
SHA-256 | 5e4647a07cb31b5d6d0049972a45375c137de908a964a44e2d6d231fa3ad4b52
Red Hat Security Advisory 2021-0691-01
Posted Mar 2, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0691-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow, protocol
systems | linux, redhat
advisories | CVE-2020-8625
SHA-256 | 99c97bd55ebcf7b3b44170c0c91880cdba7fd6d905eb567662a806a37ce73a45
Ubuntu Security Notice USN-4737-2
Posted Mar 2, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4737-2 - USN-4737-1 fixed a vulnerability in Bind. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. It was discovered that Bind incorrectly handled GSSAPI security policy negotiation. A remote attacker could use this issue to cause Bind to crash, resulting in a denial of service, or possibly execute arbitrary code. In the default installation, attackers would be isolated by the Bind AppArmor profile. Various other issues were also addressed.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2020-8625
SHA-256 | 8a0e368b8840f8ec1b3b94248a1d45882762a7bc660dba12302673a0e7e0bc90
Web Based Quiz System 1.0 Cross Site Scripting
Posted Mar 2, 2021
Authored by Praharsh Kumar Singh

Web Based Quiz System version 1.0 suffers from a persistent cross site scripting vulnerability related to MCQ options.

tags | exploit, web, xss
SHA-256 | 762e603d777b45c1e25c74f863e2a9a3e03a784ae542fd312880ad301b6eddd1
CASAP Automated Enrollment System 1.1 SQL Injection
Posted Mar 2, 2021
Authored by nu11secur1ty

CASAP Automated Enrollment System version 1.1 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 42eb07d9630195bb39e10b9baec9a00896bb2bb1cee634e40491dea6513c0e7b
Red Hat Security Advisory 2021-0692-01
Posted Mar 2, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0692-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow, protocol
systems | linux, redhat
advisories | CVE-2020-8625
SHA-256 | 6f615f341c71255a07f8e345e489427436f905a55452ab1d0ed8ac365c63f6c9
Zen Cart 1.5.7b Remote Code Execution
Posted Mar 2, 2021
Authored by Mucahit Saratar | Site metasploit.com

This Metasploit module exploits a remote code execution vulnerability in Zen Cart version 1.5.7b.

tags | exploit, remote, code execution
advisories | CVE-2021-3291
SHA-256 | 8d5032e18d3ec8af06cff2c83a6d1c96f8ae217ac3bcace303bbdbbec14b831f
Red Hat Security Advisory 2021-0693-01
Posted Mar 2, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0693-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow, protocol
systems | linux, redhat
advisories | CVE-2020-8625
SHA-256 | 768623d83ec6a6362792f51d8d8887db9d1877ec4c289fd656b96d33b2f1c4a7
Profiling System For Human Resource Management 1.0 Cross Site Scripting
Posted Mar 2, 2021
Authored by Richard Jones

Profiling System For Human Resource Management version 1.0 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | e163603c084bcb4021aa7fd98125fa39b725d35dfe7a979510ef2c7473b0d2ff
Red Hat Security Advisory 2021-0694-01
Posted Mar 2, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0694-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow, protocol
systems | linux, redhat
advisories | CVE-2020-8625
SHA-256 | fb77b712176bdaca91d761260c2d81c3a0a227f363b94396d229f1fd080caada
Red Hat Security Advisory 2021-0686-01
Posted Mar 2, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0686-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2020-0444, CVE-2020-14351, CVE-2020-25705, CVE-2020-29661
SHA-256 | 4346ebd283d83e7d5a258dd32e08f2db58345e7ac7f7af3ef8145d22b4570608
Web Based Quiz System 1.0 Cross Site Scripting
Posted Mar 2, 2021
Authored by P.Naveen Kumar

Web Based Quiz System version 1.0 suffers from a persistent cross site scripting vulnerability in the name field.

tags | exploit, web, xss
SHA-256 | f3b884c0c660ca6f4862b3070b5c102e6ece08ceadd42fec10ec7f19f867368e
Red Hat Security Advisory 2021-0689-01
Posted Mar 2, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0689-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2020-0444, CVE-2020-29661
SHA-256 | 6201a82d0790a7c15b56eca2f83705511ee46b4f53eab07dff124a7d2d5ecbe8
TinyTinyRSS Remote Code Execution
Posted Mar 2, 2021
Authored by Benjamin Nadarevic, Daniel Neagaru

TinyTinyRSS remote code execution exploit. Versions prior to 2020-09-16 are affected.

tags | exploit, remote, code execution
advisories | CVE-2020-25787
SHA-256 | a8fa1bafa100a728d444217ef6a728e32ccd26ad5ef1fb19ae9f86cd2639a2d6
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close