exploit the possibilities
Showing 101 - 125 of 448 RSS Feed

Files Date: 2021-05-01 to 2021-05-31

Red Hat Security Advisory 2021-1562-01
Posted May 24, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-1562-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.7.12.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-30465
MD5 | 951fd3d318e26088687c86cdf2a27fd4
Red Hat Security Advisory 2021-2095-01
Posted May 24, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2095-01 - Red Hat OpenShift Serverless Client kn 1.14.1 provides a CLI to interact with Red Hat OpenShift Serverless 1.14.1. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms. Issues addressed include a code execution vulnerability.

tags | advisory, code execution
systems | linux, redhat
advisories | CVE-2021-3114, CVE-2021-3115
MD5 | 8ae9dda1a65ff37de19b5cec98cf595c
Red Hat Security Advisory 2021-2093-01
Posted May 24, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2093-01 - Red Hat OpenShift Serverless 1.14.1 is a generally available release of the OpenShift Serverless Operator. This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6 and 4.7, and includes security and bug fixes and enhancements. For more information, see the documentation listed in the References section. Issues addressed include a code execution vulnerability.

tags | advisory, code execution
systems | linux, redhat
advisories | CVE-2021-3114, CVE-2021-3115
MD5 | 9e2a5010e4be870fe881f12866ceb29c
Backdoor.Win32.Tonerok.d Code Execution
Posted May 24, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Tonerok.d malware suffers from a code execution vulnerability.

tags | exploit, code execution
systems | windows
MD5 | 7025d264db8427c0934a96c52d9e5142
Codiad 2.8.4 Remote Code Execution
Posted May 24, 2021
Authored by Ron Jost

Codiad version 2.8.4 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2019-19208
MD5 | 0dbcdaefecfb8baa6728cc0c5caad922
Backdoor.Win32.Spion4 Insecure Transit
Posted May 24, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Spion4 malware suffers from insecure transit issues.

tags | exploit
systems | windows
MD5 | 2e20e2b52d8b3949a09e35135e3b7605
Schlix CMS 2.2.6-6 Shell Upload / Directory Traversal
Posted May 24, 2021
Authored by Emir Polat

Schlix CMS version 2.2.6-6 suffers from an arbitrary file upload and a directory traversal that together can lead to remote command execution.

tags | exploit, remote, arbitrary, file inclusion, file upload
MD5 | f2f6e3d92179511f87fa66f851387309
PHP 8.1.0-dev Backdoor Remote Command Injection
Posted May 24, 2021
Authored by Richard Jones

PHP version 8.1.0-dev backdoor unauthenticated remote command injection exploit.

tags | exploit, remote, php
MD5 | a54b850535116f4636c38a6855b8cf15
Shopizer 2.16.0 Cross Site Scripting
Posted May 24, 2021
Authored by Marek Toth

Shopizer versions 2.16.0 and below suffer from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 455eaca44a7667f0e47ed7c2f5c91712
iDailyDiary 4.30 Denial Of Service
Posted May 24, 2021
Authored by Ismael Nava

iDailyDiary version 4.30 suffers from a denial of service vulnerability.

tags | exploit, denial of service
MD5 | e487cd68a52c6d68fab72a105b95225d
Backdoor.Win32.Upload.a Denial Of Service
Posted May 24, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Upload.a malware suffers from a denial of service vulnerability.

tags | exploit, denial of service
systems | windows
MD5 | 30b82b724c7f3aba216470fc70bec4e7
Backdoor.Win32.Spirit.12.b Insecure Permissions
Posted May 24, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Spirit.12.b malware suffers from an insecure permissions vulnerability.

tags | exploit
systems | windows
MD5 | 23e8d96e7fa8dcf13e94ad19f51e7146
WordPress ReDi Restaurant Reservation 21.0307 Cross Site Scripting
Posted May 24, 2021
Authored by Bastijn Ouwendijk

WordPress ReDi Restaurant Reservation plugin version 21.0307 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2021-24299
MD5 | 97371d46e078284e75d608dc3d9438a0
D-Link DWR-710 Missing Validation
Posted May 24, 2021
Authored by Prithwish Kumar Pal

D-Link DWR-710 is missing server-side controls to ensure that null passwords are not set.

tags | exploit
MD5 | 5717830371e0d6041068af465dd03904
ePowerSvc 6.0.3008.0 Unquoted Service Path
Posted May 23, 2021
Authored by Emmanuel Lujan

ePowerSvc version 6.0.3008.0 suffers from an unquoted service path vulnerability.

tags | exploit
MD5 | e4c02b52ae786fedb2a074e56ffd2c29
DiskBoss Service 12.2.18 Unquoted Service Path
Posted May 23, 2021
Authored by Erick Galindo

DiskBoss Service version 12.2.18 suffers from an unquoted service path vulnerability.

tags | exploit
MD5 | 18b444c469c2694e01313945d61c03ba
Backdoor.Win32.SkyDance.216 Buffer Overflow
Posted May 22, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.SkyDance.216 malware suffers from a buffer overflow vulnerability.

tags | exploit, overflow
systems | windows
MD5 | 57edfc436cb1642fb3395188a4289879
Backdoor.Win32.Singu.a Buffer Overflow
Posted May 22, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Singu.a malware suffers from a buffer overflow vulnerability.

tags | exploit, overflow
systems | windows
MD5 | c54af8a1d6e5046192f32f269575cae0
DELL dbutil_2_3.sys 2.3 Arbitrary Write / Privilege Escalation
Posted May 21, 2021
Authored by Paolo Stagno

DELL dbutil_2_3.sys version 2.3 arbitrary write to local privilege escalation exploit.

tags | exploit, arbitrary, local
advisories | CVE-2021-21551
MD5 | 3a0a0615d3346ea2aa9d4adf04b159bb
WordPress WP Statistics 13.0.7 SQL Injection
Posted May 21, 2021
Authored by Mansoor R

WordPress WP Statistics plugin versions 13.0 to 13.0.7 suffer from a remote unauthenticated blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | f55763934154541b757f351038c0e96d
libX11 Insufficient Length Check / Injection
Posted May 21, 2021
Authored by Roman Fiedler | Site unparalleled.eu

A missing length check in libX11 allows data from LookupColor requests to mess up the client-server communication protocol and inject malicious X server requests.

tags | exploit, protocol
advisories | CVE-2021-31535
MD5 | b5d8ea0b68cc25ac14147bafef309ffc
Microsoft Exchange ProxyLogon Collector
Posted May 21, 2021
Authored by Ramella Sebastien | Site metasploit.com

This Metasploit module scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin by chaining this bug with another post-auth arbitrary-file-write vulnerability to get code execution. As a result, an unauthenticated attacker can execute arbitrary commands on Microsoft Exchange Server. This vulnerability affects Exchange 2013 versions below 15.00.1497.012, Exchange 2016 CU18 below 15.01.2106.013, Exchange 2016 CU19 below 15.01.2176.009, Exchange 2019 CU7 below 15.02.0721.013, and Exchange 2019 CU8 below 15.02.0792.010 . All components are vulnerable by default.

tags | exploit, arbitrary, code execution, info disclosure
advisories | CVE-2021-26855, CVE-2021-27065
MD5 | dc11b2a7355d1a3002d6afb260c6975f
Mozilla Firefox 88.0.1 File Extension Execution
Posted May 21, 2021
Authored by Carlo Di Dato, Michael Caruso

Mozilla Firefox versions 88.0.1 and below suffer from an issue that allows for execution of a file holding arbitrary code just by downloading it.

tags | exploit, arbitrary
MD5 | 4209a38ae2af93ab0de4834dc8ca7b8b
Sifter 12
Posted May 21, 2021
Authored by s1l3nt78 | Site github.com

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

Changes: Sifter can now spawn multiple sessions for any menu. Various install fixes. Various Runtime fixes. Added 6 additional tool integrations.
tags | tool, remote, local, scanner, vulnerability
systems | unix
MD5 | 5b120f5b6599a80ecf6dffa04a8b5ebb
Red Hat Security Advisory 2021-2085-01
Posted May 20, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2085-01 - Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. Issues addressed include a bypass vulnerability.

tags | advisory, bypass
systems | linux, redhat
advisories | CVE-2021-31921
MD5 | 9212bf11498d6800ac0df8f187a34d19
Page 5 of 18
Back34567Next

File Archive:

June 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    35 Files
  • 2
    Jun 2nd
    14 Files
  • 3
    Jun 3rd
    40 Files
  • 4
    Jun 4th
    22 Files
  • 5
    Jun 5th
    1 Files
  • 6
    Jun 6th
    1 Files
  • 7
    Jun 7th
    19 Files
  • 8
    Jun 8th
    14 Files
  • 9
    Jun 9th
    39 Files
  • 10
    Jun 10th
    20 Files
  • 11
    Jun 11th
    22 Files
  • 12
    Jun 12th
    2 Files
  • 13
    Jun 13th
    1 Files
  • 14
    Jun 14th
    32 Files
  • 15
    Jun 15th
    34 Files
  • 16
    Jun 16th
    9 Files
  • 17
    Jun 17th
    33 Files
  • 18
    Jun 18th
    11 Files
  • 19
    Jun 19th
    1 Files
  • 20
    Jun 20th
    3 Files
  • 21
    Jun 21st
    2 Files
  • 22
    Jun 22nd
    21 Files
  • 23
    Jun 23rd
    19 Files
  • 24
    Jun 24th
    12 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close