what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 447 RSS Feed

Files Date: 2021-05-01 to 2021-05-31

Red Hat Security Advisory 2021-1562-01
Posted May 24, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-1562-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.7.12.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-30465
SHA-256 | ae44f3f2b2120176e20ba773b4b56cf8274fd7796cd4f161c81afe8b54b4657b
Red Hat Security Advisory 2021-2095-01
Posted May 24, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2095-01 - Red Hat OpenShift Serverless Client kn 1.14.1 provides a CLI to interact with Red Hat OpenShift Serverless 1.14.1. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms. Issues addressed include a code execution vulnerability.

tags | advisory, code execution
systems | linux, redhat
advisories | CVE-2021-3114, CVE-2021-3115
SHA-256 | e308c1468aad01ec665814efee9eb07ce9f97ef894ba4eeba07b41306ffaef24
Red Hat Security Advisory 2021-2093-01
Posted May 24, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2093-01 - Red Hat OpenShift Serverless 1.14.1 is a generally available release of the OpenShift Serverless Operator. This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6 and 4.7, and includes security and bug fixes and enhancements. For more information, see the documentation listed in the References section. Issues addressed include a code execution vulnerability.

tags | advisory, code execution
systems | linux, redhat
advisories | CVE-2021-3114, CVE-2021-3115
SHA-256 | baec5d2ddc52c88b42fb7a620995eb4d6fae2594df45d63655a6961b41702aa1
Backdoor.Win32.Tonerok.d MVID-2021-0226 Code Execution
Posted May 24, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Tonerok.d malware suffers from a code execution vulnerability.

tags | exploit, code execution
systems | windows
SHA-256 | d89a7505d629cc6fba1f798936b88077d553606a150394019d4bc812078ea3cf
Codiad 2.8.4 Remote Code Execution
Posted May 24, 2021
Authored by Ron Jost

Codiad version 2.8.4 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2019-19208
SHA-256 | 4b538410526a06035255e57015ef16fd091c575116f2fcf8b3b1dd8249289836
Backdoor.Win32.Spion4 MVID-2021-0225 Insecure Transit
Posted May 24, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Spion4 malware suffers from insecure transit issues.

tags | exploit
systems | windows
SHA-256 | 8bac0a76f0cd7170e9ce826732ba6b768690358bde5f535ef99c017f7b7f9dbd
Schlix CMS 2.2.6-6 Shell Upload / Directory Traversal
Posted May 24, 2021
Authored by Emir Polat

Schlix CMS version 2.2.6-6 suffers from an arbitrary file upload and a directory traversal that together can lead to remote command execution.

tags | exploit, remote, arbitrary, file inclusion, file upload
SHA-256 | fca5df7ad0d34a5f7b8addf705a53ad2dd0527cb631c1a47240bfd8afd22f8d1
PHP 8.1.0-dev Backdoor Remote Command Injection
Posted May 24, 2021
Authored by Richard Jones

PHP version 8.1.0-dev backdoor unauthenticated remote command injection exploit.

tags | exploit, remote, php
SHA-256 | f51b0d373568167c85b67d4b60c1a737739975e2f231f5619d8e1b7a3a1058f6
Shopizer 2.16.0 Cross Site Scripting
Posted May 24, 2021
Authored by Marek Toth

Shopizer versions 2.16.0 and below suffer from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | f15a089b7dcf418d935f27932884b67add84f6119777557042986fb205a02eeb
iDailyDiary 4.30 Denial Of Service
Posted May 24, 2021
Authored by Ismael Nava

iDailyDiary version 4.30 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | ab08487ed9c6cd04b478d62b9ad859640963033947395c4da0b42b090d3d908c
Backdoor.Win32.Upload.a MVID-2021-0224 Denial Of Service
Posted May 24, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Upload.a malware suffers from a denial of service vulnerability.

tags | exploit, denial of service
systems | windows
SHA-256 | 4c6245a87e6421767c9377441a3310cc01489e66518b5d653698404989485d15
Backdoor.Win32.Spirit.12.b MVID-2021-0223 Insecure Permissions
Posted May 24, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Spirit.12.b malware suffers from an insecure permissions vulnerability.

tags | exploit
systems | windows
SHA-256 | c81205395cc2ce19021a86b19634ef125263781a3cbcfb9b122be68801c44be8
WordPress ReDi Restaurant Reservation 21.0307 Cross Site Scripting
Posted May 24, 2021
Authored by Bastijn Ouwendijk

WordPress ReDi Restaurant Reservation plugin version 21.0307 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2021-24299
SHA-256 | 8ad34d8c76465dc7b07f7fdbbaa7005db7b393559dc9279869c2d52fd7aff505
D-Link DWR-710 Missing Validation
Posted May 24, 2021
Authored by Prithwish Kumar Pal

D-Link DWR-710 is missing server-side controls to ensure that null passwords are not set.

tags | exploit
SHA-256 | d4fb04ccc3705267fde078039060bb0697687df5c1b9cdeb6c7e9ff66be55e3f
ePowerSvc 6.0.3008.0 Unquoted Service Path
Posted May 23, 2021
Authored by Emmanuel Lujan

ePowerSvc version 6.0.3008.0 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | 32920451ca11f29b606727f1e27b11d2faa37cbfd7b4f043fde122ebd91f3dbd
DiskBoss Service 12.2.18 Unquoted Service Path
Posted May 23, 2021
Authored by Erick Galindo

DiskBoss Service version 12.2.18 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | 10f6f30777a914e6f89f7dc3b803a5f2fd210d647ad35cdb6d7a86a01c3b869d
Backdoor.Win32.SkyDance.216 MVID-2021-0222 Buffer Overflow
Posted May 22, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.SkyDance.216 malware suffers from a buffer overflow vulnerability.

tags | exploit, overflow
systems | windows
SHA-256 | d12292831640bef5a90b2d0ea2b96fee2c4a006f9b7dc70edf37e7fa2b7c4661
Backdoor.Win32.Singu.a MVID-2021-0221 Buffer Overflow
Posted May 22, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Singu.a malware suffers from a buffer overflow vulnerability.

tags | exploit, overflow
systems | windows
SHA-256 | 99abce8d3afa3f05677d6e4e45db4586ce71afd3995e4b35dfcedb9f506a3173
DELL dbutil_2_3.sys 2.3 Arbitrary Write / Privilege Escalation
Posted May 21, 2021
Authored by Paolo Stagno

DELL dbutil_2_3.sys version 2.3 arbitrary write to local privilege escalation exploit.

tags | exploit, arbitrary, local
advisories | CVE-2021-21551
SHA-256 | 1b10b851f28ebcbedb7f78ec52ac6495c3ac33581ea7f4551b9e90ac510e6512
WordPress WP Statistics 13.0.7 SQL Injection
Posted May 21, 2021
Authored by Mansoor R

WordPress WP Statistics plugin versions 13.0 to 13.0.7 suffer from a remote unauthenticated blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | dba4efd5e93d07eb78cf38fe1ac3e56f720b56d00529815d029b973a3a8abb18
libX11 Insufficient Length Check / Injection
Posted May 21, 2021
Authored by Roman Fiedler | Site unparalleled.eu

A missing length check in libX11 allows data from LookupColor requests to mess up the client-server communication protocol and inject malicious X server requests.

tags | exploit, protocol
advisories | CVE-2021-31535
SHA-256 | 11761ba0cb40d006d1d9f835688853c9f235d462bc42a8503f286b6871a81294
Microsoft Exchange ProxyLogon Collector
Posted May 21, 2021
Authored by Ramella Sebastien | Site metasploit.com

This Metasploit module scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin by chaining this bug with another post-auth arbitrary-file-write vulnerability to get code execution. As a result, an unauthenticated attacker can execute arbitrary commands on Microsoft Exchange Server. This vulnerability affects Exchange 2013 versions below 15.00.1497.012, Exchange 2016 CU18 below 15.01.2106.013, Exchange 2016 CU19 below 15.01.2176.009, Exchange 2019 CU7 below 15.02.0721.013, and Exchange 2019 CU8 below 15.02.0792.010 . All components are vulnerable by default.

tags | exploit, arbitrary, code execution, info disclosure
advisories | CVE-2021-26855, CVE-2021-27065
SHA-256 | 585a4badc4bc32954c170e5f8283ee5e2c9ceb31c4f0aab20e24dc5c6ff31912
Mozilla Firefox 88.0.1 File Extension Execution
Posted May 21, 2021
Authored by Carlo Di Dato, Michael Caruso

Mozilla Firefox versions 88.0.1 and below suffer from an issue that allows for execution of a file holding arbitrary code just by downloading it.

tags | exploit, arbitrary
SHA-256 | 2d9fb3701cd5ddb0888856065d284561d2d63a20f39e9f9c2e1486f3ef9f0974
Sifter 12
Posted May 21, 2021
Authored by s1l3nt78 | Site github.com

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

Changes: Sifter can now spawn multiple sessions for any menu. Various install fixes. Various Runtime fixes. Added 6 additional tool integrations.
tags | tool, remote, local, scanner, vulnerability
systems | unix
SHA-256 | 3b42c5c21ad8b35302b4dac221d01252c0a94ae46bdc1c6876726f60d11b97cd
Red Hat Security Advisory 2021-2085-01
Posted May 20, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2085-01 - Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. Issues addressed include a bypass vulnerability.

tags | advisory, bypass
systems | linux, redhat
advisories | CVE-2021-31921
SHA-256 | 4f0a81e2c5d27fd9a6c3b5e1e56f67f322754ea46a1bd409211ea15627fa957d
Page 5 of 18
Back34567Next

File Archive:

October 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    10 Files
  • 2
    Oct 2nd
    0 Files
  • 3
    Oct 3rd
    12 Files
  • 4
    Oct 4th
    0 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close