what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 34 of 34 RSS Feed

Files Date: 2021-06-15 to 2021-06-16

SAP Hybris eCommerce Server-Side Request Forgery
Posted Jun 15, 2021
Authored by Gaston Traberg | Site onapsis.com

An unauthenticated server-side request forgery vulnerability exists in SAP Hybris acceleratorservices. This means that anyone accessing this extension is able to use it to make arbitrary HTTP requests, bypassing network restrictions. Versions affected include 1808, 1811, 1905, and 2005.

tags | advisory, web, arbitrary
advisories | CVE-2020-26811
SHA-256 | b53e0a33c20b6b6c42760d7b7dbb5e3ba1657246bda4b65bb14054a620c16d7d
Polkit 0.105-26 0.117-2 Privilege Escalation
Posted Jun 15, 2021
Authored by J Smith

Polkit version Polkit 0.105-26 0.117-2 suffers from a local privilege escalation vulnerability.

tags | exploit, local
advisories | CVE-2021-3560
SHA-256 | 89700c7a75c7c7ebb3f47ffc215d09f899edced891a3fb50cd529fb84ddb9603
Online Library Management System 2.0 Cross Site Request Forgery
Posted Jun 15, 2021
Authored by Mohit Dabas

Online Library Management System version 2.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | f335a643743c790f4fb904a776705386fc4d1db5eb5374c4b6fe56d99496825a
Red Hat Security Advisory 2021-2415-01
Posted Jun 15, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2415-01 - The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow, protocol
systems | linux, redhat
advisories | CVE-2021-25217
SHA-256 | 078cec21a8b047d1e60c397f39820a73a6d7deafcc9adbbf2a5702dc9ba87d89
Brother BRAgent 1.38 Unquoted Service Path
Posted Jun 15, 2021
Authored by Brian Rodriguez

Brother BRAgent version 1.38 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | 45eb60c14cadc67806799b3d0213269febdc728de0d20a442eb8639accef3766
Sami HTTP Server 2.0 Denial Of Service
Posted Jun 15, 2021
Authored by Fernando Mengali

Sami HTTP server version 2.0 suffers from a denial of service vulnerability.

tags | exploit, web, denial of service
SHA-256 | 701379fe6f3a3ab77800326f632f07e8141a7375f546d11b21c4b1c0cfdf53c3
Red Hat Security Advisory 2021-2418-01
Posted Jun 15, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2418-01 - The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow, protocol
systems | linux, redhat
advisories | CVE-2021-25217
SHA-256 | 10bf21362e07c081c7d01d6dbd7e66a110a9396ed7739d08d6a9646b30c9708e
SAP Solution Manager 7.2 (ST 720) Open Redirection
Posted Jun 15, 2021
Authored by Yvan Genuer | Site onapsis.com

SAP Solution Manager version 7.2 (ST 720) suffers from an open redirection vulnerability.

tags | exploit
advisories | CVE-2020-26836
SHA-256 | be314dee601c6b7d96a925a535be63d81b445ebec3bcdd2a0214aea82ebc5152
SysGauge 7.9.18 Unquoted Service Path
Posted Jun 15, 2021
Authored by Brian Rodriguez

SysGauge version 7.9.18 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | fcd09279bc57ebc79a34136a3e3594bfb26cc173766c8b51230b0e912f425676
Page 2 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close