what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 34 of 34 RSS Feed

Files Date: 2021-06-15 to 2021-06-16

SAP Hybris eCommerce Server-Side Request Forgery
Posted Jun 15, 2021
Authored by Gaston Traberg | Site onapsis.com

An unauthenticated server-side request forgery vulnerability exists in SAP Hybris acceleratorservices. This means that anyone accessing this extension is able to use it to make arbitrary HTTP requests, bypassing network restrictions. Versions affected include 1808, 1811, 1905, and 2005.

tags | advisory, web, arbitrary
advisories | CVE-2020-26811
SHA-256 | b53e0a33c20b6b6c42760d7b7dbb5e3ba1657246bda4b65bb14054a620c16d7d
Polkit 0.105-26 0.117-2 Privilege Escalation
Posted Jun 15, 2021
Authored by J Smith

Polkit version Polkit 0.105-26 0.117-2 suffers from a local privilege escalation vulnerability.

tags | exploit, local
advisories | CVE-2021-3560
SHA-256 | 89700c7a75c7c7ebb3f47ffc215d09f899edced891a3fb50cd529fb84ddb9603
Online Library Management System 2.0 Cross Site Request Forgery
Posted Jun 15, 2021
Authored by Mohit Dabas

Online Library Management System version 2.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | f335a643743c790f4fb904a776705386fc4d1db5eb5374c4b6fe56d99496825a
Red Hat Security Advisory 2021-2415-01
Posted Jun 15, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2415-01 - The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow, protocol
systems | linux, redhat
advisories | CVE-2021-25217
SHA-256 | 078cec21a8b047d1e60c397f39820a73a6d7deafcc9adbbf2a5702dc9ba87d89
Brother BRAgent 1.38 Unquoted Service Path
Posted Jun 15, 2021
Authored by Brian Rodriguez

Brother BRAgent version 1.38 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | 45eb60c14cadc67806799b3d0213269febdc728de0d20a442eb8639accef3766
Sami HTTP Server 2.0 Denial Of Service
Posted Jun 15, 2021
Authored by Fernando Mengali

Sami HTTP server version 2.0 suffers from a denial of service vulnerability.

tags | exploit, web, denial of service
SHA-256 | 701379fe6f3a3ab77800326f632f07e8141a7375f546d11b21c4b1c0cfdf53c3
Red Hat Security Advisory 2021-2418-01
Posted Jun 15, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2418-01 - The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow, protocol
systems | linux, redhat
advisories | CVE-2021-25217
SHA-256 | 10bf21362e07c081c7d01d6dbd7e66a110a9396ed7739d08d6a9646b30c9708e
SAP Solution Manager 7.2 (ST 720) Open Redirection
Posted Jun 15, 2021
Authored by Yvan Genuer | Site onapsis.com

SAP Solution Manager version 7.2 (ST 720) suffers from an open redirection vulnerability.

tags | exploit
advisories | CVE-2020-26836
SHA-256 | be314dee601c6b7d96a925a535be63d81b445ebec3bcdd2a0214aea82ebc5152
SysGauge 7.9.18 Unquoted Service Path
Posted Jun 15, 2021
Authored by Brian Rodriguez

SysGauge version 7.9.18 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | fcd09279bc57ebc79a34136a3e3594bfb26cc173766c8b51230b0e912f425676
Page 2 of 2
Back12Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close