what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 126 - 150 of 464 RSS Feed

Files Date: 2021-05-01 to 2021-05-31

Shopizer 2.16.0 Cross Site Scripting
Posted May 24, 2021
Authored by Marek Toth

Shopizer versions 2.16.0 and below suffer from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | f15a089b7dcf418d935f27932884b67add84f6119777557042986fb205a02eeb
iDailyDiary 4.30 Denial Of Service
Posted May 24, 2021
Authored by Ismael Nava

iDailyDiary version 4.30 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | ab08487ed9c6cd04b478d62b9ad859640963033947395c4da0b42b090d3d908c
Backdoor.Win32.Upload.a MVID-2021-0224 Denial Of Service
Posted May 24, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Upload.a malware suffers from a denial of service vulnerability.

tags | exploit, denial of service
systems | windows
SHA-256 | 4c6245a87e6421767c9377441a3310cc01489e66518b5d653698404989485d15
Backdoor.Win32.Spirit.12.b MVID-2021-0223 Insecure Permissions
Posted May 24, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Spirit.12.b malware suffers from an insecure permissions vulnerability.

tags | exploit
systems | windows
SHA-256 | c81205395cc2ce19021a86b19634ef125263781a3cbcfb9b122be68801c44be8
WordPress ReDi Restaurant Reservation 21.0307 Cross Site Scripting
Posted May 24, 2021
Authored by Bastijn Ouwendijk

WordPress ReDi Restaurant Reservation plugin version 21.0307 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2021-24299
SHA-256 | 8ad34d8c76465dc7b07f7fdbbaa7005db7b393559dc9279869c2d52fd7aff505
D-Link DWR-710 Missing Validation
Posted May 24, 2021
Authored by Prithwish Kumar Pal

D-Link DWR-710 is missing server-side controls to ensure that null passwords are not set.

tags | exploit
SHA-256 | d4fb04ccc3705267fde078039060bb0697687df5c1b9cdeb6c7e9ff66be55e3f
ePowerSvc 6.0.3008.0 Unquoted Service Path
Posted May 23, 2021
Authored by Emmanuel Lujan

ePowerSvc version 6.0.3008.0 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | 32920451ca11f29b606727f1e27b11d2faa37cbfd7b4f043fde122ebd91f3dbd
DiskBoss Service 12.2.18 Unquoted Service Path
Posted May 23, 2021
Authored by Erick Galindo

DiskBoss Service version 12.2.18 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | 10f6f30777a914e6f89f7dc3b803a5f2fd210d647ad35cdb6d7a86a01c3b869d
Backdoor.Win32.SkyDance.216 MVID-2021-0222 Buffer Overflow
Posted May 22, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.SkyDance.216 malware suffers from a buffer overflow vulnerability.

tags | exploit, overflow
systems | windows
SHA-256 | d12292831640bef5a90b2d0ea2b96fee2c4a006f9b7dc70edf37e7fa2b7c4661
Backdoor.Win32.Singu.a MVID-2021-0221 Buffer Overflow
Posted May 22, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Singu.a malware suffers from a buffer overflow vulnerability.

tags | exploit, overflow
systems | windows
SHA-256 | 99abce8d3afa3f05677d6e4e45db4586ce71afd3995e4b35dfcedb9f506a3173
DELL dbutil_2_3.sys 2.3 Arbitrary Write / Privilege Escalation
Posted May 21, 2021
Authored by Paolo Stagno

DELL dbutil_2_3.sys version 2.3 arbitrary write to local privilege escalation exploit.

tags | exploit, arbitrary, local
advisories | CVE-2021-21551
SHA-256 | 1b10b851f28ebcbedb7f78ec52ac6495c3ac33581ea7f4551b9e90ac510e6512
WordPress WP Statistics 13.0.7 SQL Injection
Posted May 21, 2021
Authored by Mansoor R

WordPress WP Statistics plugin versions 13.0 to 13.0.7 suffer from a remote unauthenticated blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | dba4efd5e93d07eb78cf38fe1ac3e56f720b56d00529815d029b973a3a8abb18
libX11 Insufficient Length Check / Injection
Posted May 21, 2021
Authored by Roman Fiedler | Site unparalleled.eu

A missing length check in libX11 allows data from LookupColor requests to mess up the client-server communication protocol and inject malicious X server requests.

tags | exploit, protocol
advisories | CVE-2021-31535
SHA-256 | 11761ba0cb40d006d1d9f835688853c9f235d462bc42a8503f286b6871a81294
Microsoft Exchange ProxyLogon Collector
Posted May 21, 2021
Authored by Ramella Sebastien | Site metasploit.com

This Metasploit module scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin by chaining this bug with another post-auth arbitrary-file-write vulnerability to get code execution. As a result, an unauthenticated attacker can execute arbitrary commands on Microsoft Exchange Server. This vulnerability affects Exchange 2013 versions below 15.00.1497.012, Exchange 2016 CU18 below 15.01.2106.013, Exchange 2016 CU19 below 15.01.2176.009, Exchange 2019 CU7 below 15.02.0721.013, and Exchange 2019 CU8 below 15.02.0792.010 . All components are vulnerable by default.

tags | exploit, arbitrary, code execution, info disclosure
advisories | CVE-2021-26855, CVE-2021-27065
SHA-256 | 585a4badc4bc32954c170e5f8283ee5e2c9ceb31c4f0aab20e24dc5c6ff31912
Mozilla Firefox 88.0.1 File Extension Execution
Posted May 21, 2021
Authored by Carlo Di Dato, Michael Caruso

Mozilla Firefox versions 88.0.1 and below suffer from an issue that allows for execution of a file holding arbitrary code just by downloading it.

tags | exploit, arbitrary
SHA-256 | 2d9fb3701cd5ddb0888856065d284561d2d63a20f39e9f9c2e1486f3ef9f0974
Sifter 12
Posted May 21, 2021
Authored by s1l3nt78 | Site github.com

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

Changes: Sifter can now spawn multiple sessions for any menu. Various install fixes. Various Runtime fixes. Added 6 additional tool integrations.
tags | tool, remote, local, scanner, vulnerability
systems | unix
SHA-256 | 3b42c5c21ad8b35302b4dac221d01252c0a94ae46bdc1c6876726f60d11b97cd
Red Hat Security Advisory 2021-2085-01
Posted May 20, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2085-01 - Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. Issues addressed include a bypass vulnerability.

tags | advisory, bypass
systems | linux, redhat
advisories | CVE-2021-31921
SHA-256 | 4f0a81e2c5d27fd9a6c3b5e1e56f67f322754ea46a1bd409211ea15627fa957d
Red Hat Security Advisory 2021-2077-01
Posted May 20, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2077-01 - Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Issues addressed include buffer overflow, denial of service, and memory leak vulnerabilities.

tags | advisory, remote, denial of service, overflow, vulnerability, protocol, memory leak
systems | linux, redhat
advisories | CVE-2015-8011, CVE-2020-27827, CVE-2020-35498
SHA-256 | 705bb18b078700e9fd3519317ba6fa9569a33116767336c61e78eb943ce836ca
Red Hat Security Advisory 2021-2070-01
Posted May 20, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2070-01 - Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.4.7 serves as a replacement for Red Hat Single Sign-On 7.4.6, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include an information leakage vulnerability.

tags | advisory, web
systems | linux, redhat
advisories | CVE-2021-21290, CVE-2021-21295, CVE-2021-3424, CVE-2021-3461
SHA-256 | 7578f5d5a1382ac369ceea4ea502ae58bc21dcff6d70b2118e08a915a5e53ffc
Spotweb-Develop 1.4.9 Cross Site Scripting
Posted May 20, 2021
Authored by nu11secur1ty

Spotweb-Develop version 1.4.9 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | edc08c2a5faaffc264b7ebd53bd4a33e8c3c676b0c81127f6aa98fce2d4127ad
GRR 3.4.3.1
Posted May 20, 2021
Authored by Andreas Moser, Mikhail Bushkov, Ben Galehouse, Milosz Lakomy | Site github.com

GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data.

Changes: Prometheus/Grafana support have been added. A new collect large file flow has been added. New Elasticsearch output plugin. Multiple API changes, bug fixes, and various minor enhancements.
tags | tool, remote, web, forensics
systems | unix
SHA-256 | 6eb8e889cd5d36a2882152da0ee21316d93409184738ea0b1cc9a7320da289f4
Red Hat Security Advisory 2021-2063-01
Posted May 20, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2063-01 - Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.4.7 serves as a replacement for Red Hat Single Sign-On 7.4.6, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.

tags | advisory, web
systems | linux, redhat
advisories | CVE-2021-3424, CVE-2021-3461
SHA-256 | 2d94d628fff183b8bda7439b36a66bd0a88152b124667aef77772b30dd1123f6
Red Hat Security Advisory 2021-2064-01
Posted May 20, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2064-01 - Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.4.7 serves as a replacement for Red Hat Single Sign-On 7.4.6, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.

tags | advisory, web
systems | linux, redhat
advisories | CVE-2021-3424, CVE-2021-3461
SHA-256 | ca330cd165ae9f65b71504ad056484a8e1c4b9cd91183154e930683371117aea
Red Hat Security Advisory 2021-2065-01
Posted May 20, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2065-01 - Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.4.7 serves as a replacement for Red Hat Single Sign-On 7.4.6, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.

tags | advisory, web
systems | linux, redhat
advisories | CVE-2021-3424, CVE-2021-3461
SHA-256 | 509feb989748a2a2ede4a51dc864d3c3f34475ef5553bd818835f7aec1668774
Red Hat Security Advisory 2021-2061-01
Posted May 20, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2061-01 - Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. Issues addressed include a bypass vulnerability.

tags | advisory, bypass
systems | linux, redhat
advisories | CVE-2021-31921
SHA-256 | eb0886f0c0c16fa210f72e2ade067bf043867c0b3261d23ce696638f432b054c
Page 6 of 19
Back45678Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close