exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 449 RSS Feed

Files Date: 2021-06-01 to 2021-06-30

Trojan-Dropper.Win32.Scrop.dyi MVID-2021-0262 Insecure Permissions
Posted Jun 28, 2021
Authored by malvuln | Site malvuln.com

Trojan-Dropper.Win32.Scrop.dyi malware suffers from an insecure permissions vulnerability.

tags | exploit, trojan
systems | windows
SHA-256 | b441fde6d9d688819e5a6d44c127c549633b249a0905d34d885c9ae37e5210fe
Personnel Record Management System 1.0 SQL Injection
Posted Jun 28, 2021
Authored by Richard Jones

Personnel Record Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 2776b79bc1477dd0a9d6f3c66f393968ec921589928f2bb358a7296cf68a94b8
Android Data Exfiltration
Posted Jun 28, 2021
Authored by Roman Fiedler | Site unparalleled.eu

This is a tool that was developed to run as alternative "/init". The program will make an Android phone show up as mass storage device during boot. The complete internal storage is available for reading including the partition table and all 42 partitions of the Android system.

tags | exploit
SHA-256 | 26d0ccdaf2d09a37294e6090603335263cb221373194e10a191870af77f5fe23
Email-Worm.Win32.Trance.a MVID-2021-0261 Insecure Permissions
Posted Jun 28, 2021
Authored by malvuln | Site malvuln.com

Email-Worm.Win32.Trance.a malware suffers from an insecure permissions vulnerability.

tags | exploit, worm
systems | windows
SHA-256 | b7be52e55d136dca9ba0d96625eb0e3b7ad168eb430c19ccfa05d14f47f0ac2a
Smart Contract Automated Testing Guidelines
Posted Jun 28, 2021
Authored by Loc Phan Van

Whitepaper called Smart Contract Automated Testing Guidelines that provides guidance on automation.

tags | paper
SHA-256 | 2637d58d1c7c59b0e8b57db8f391f84b9a001dcc6d498f48455236de4f4f2d0a
Android 2.0 FreeCIV Arbitrary Code Execution
Posted Jun 28, 2021
Authored by Raed Ahsan

Android version 2.0 exploit for FreeCIV versions 2.2 before 2.2.1 and 2.3 before 2.3.0 that achieves root.

tags | exploit, root
advisories | CVE-2010-2445
SHA-256 | 84eaa0c13185db927fae6be271159ea3fe9f56dcc09261d86facb183be5d57c7
Ubuntu Security Notice USN-5000-2
Posted Jun 27, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 5000-2 - USN-5000-1 fixed vulnerabilities in the Linux kernel for Ubuntu 20.04 LTS and the Linux HWE kernel for Ubuntu 18.04 LTS. This update provides the corresponding updates for the Linux KVM kernel for Ubuntu 20.04 LTS. Norbert Slusarek discovered a race condition in the CAN BCM networking protocol of the Linux kernel leading to multiple use-after-free vulnerabilities. A local attacker could use this issue to execute arbitrary code. Various other issues were also addressed.

tags | advisory, arbitrary, kernel, local, vulnerability, protocol
systems | linux, ubuntu
advisories | CVE-2020-24586, CVE-2020-24587, CVE-2020-24588, CVE-2020-26139, CVE-2020-26141, CVE-2020-26145, CVE-2020-26147, CVE-2021-23133, CVE-2021-23134, CVE-2021-31829, CVE-2021-32399, CVE-2021-33034, CVE-2021-33200, CVE-2021-3506, CVE-2021-3609
SHA-256 | 24cb2b08987dbf402e7352676baccf4addc89319c209a6642e849c6e40814e3f
Atlassian Jira Server/Data Center 8.16.0 Cross Site Scripting
Posted Jun 26, 2021
Authored by Captain_hook

Atlassian Jira Server / Data Center version 8.16.0 suffer from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2021-26078
SHA-256 | 11cb5c10c7bc260840e9f99059eab8e717769aeff2d90a62ed3b887604e735c0
Ubuntu Security Notice USN-4998-1
Posted Jun 25, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4998-1 - It was discovered that in some situations Ceph logged passwords from the mgr module in clear text. An attacker could use this to expose sensitive information. Goutham Pacha Ravi, Jahson Babel, and John Garbutt discovered that user credentials in Ceph could be manipulated in certain environments. An attacker could use this to gain unintended access. It was discovered that the Ceph dashboard was susceptible to a cross-site scripting attack. An attacker could use this to expose sensitive information or gain unintended access. Various other issues were also addressed.

tags | advisory, xss
systems | linux, ubuntu
advisories | CVE-2020-25678, CVE-2020-27781, CVE-2020-27839, CVE-2021-20288, CVE-2021-3509, CVE-2021-3524, CVE-2021-3531
SHA-256 | a3d9656a49f07ccf660b9f6006ed598b81e2aa94c36575e1f2fa281abef63f27
Flawfinder 2.0.18
Posted Jun 25, 2021
Authored by David A. Wheeler | Site sourceforge.net

Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function.

Changes: Fixed SARIF output. SARIF output is new to flawfinder, and there was a subtle error in its generation that causes GitHub to reject the SARIF file.
tags | tool
systems | unix
SHA-256 | 6a51efd7869e0f36a00f33455ec2d1745dc36121130625887b4589e646f062c2
SAPSprint 7.60 Unquoted Service Path
Posted Jun 25, 2021
Authored by Brian Rodriguez

SAPSprint version 7.60 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | 8fd12071ae6adadfc0e695181b3356e8bf22de078d2eb3e9d81412ae18f764fa
Lightweight Facebook-Styled Blog Remote Code Execution
Posted Jun 25, 2021
Authored by Maide Ilkay Aydogdu

This Metasploit module exploits the file upload vulnerability of Lightweight self-hosted facebook-styled PHP blog and allows remote code execution.

tags | exploit, remote, php, code execution, file upload
SHA-256 | 60500517de9e732c50f65c2b42ef9aab7b59dcf4310f936b690f3460d981d122
Ubuntu Security Notice USN-4995-2
Posted Jun 25, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4995-2 - USN-4995-1 fixed vulnerabilities in Thunderbird. This update provides the corresponding updates for Ubuntu 18.04 LTS. Multiple security issues were discovered in Thunderbird. If a user were tricked into opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, spoof the UI, bypass security restrictions, or execute arbitrary code. It was discovered that extensions could open popup windows with control of the window title in some circumstances. If a user were tricked into installing a specially crafted extension, an attacker could potentially exploit this to spoof a website and trick the user into providing credentials. Multiple security issues were discovered in Thunderbird's OpenPGP integration. If a user were tricked into importing a specially crafted key in some circumstances, an attacker could potentially exploit this to cause a denial of service or confuse the user. A use-after-free was discovered when Responsive Design Mode was enabled. If a user were tricked into opening a specially crafted website with Responsive Design Mode enabled, an attacker could potentially exploit this to cause a denial of service, or execute arbitrary code. It was discovered that Thunderbird mishandled ftp URLs with encoded newline characters. If a user were tricked into clicking on a specially crafted link, an attacker could potentially exploit this to send arbitrary FTP commands. It was discovered that Thunderbird wrote signatures to disk and read them back during verification. A local attacker could potentially exploit this to replace the data with another signature file. It was discovered that Thunderbird might load an alternative OTR library. If a user were tricked into copying a specially crafted library to one of Thunderbird's search paths, an attacker could potentially exploit this to execute arbitrary code. It was discovered that secret keys imported into Thunderbird were stored unencrypted. A local attacker could potentially exploit this to obtain private keys. It was discovered that Thunderbird did not indicate when an inline signed or encrypted message contained additional unprotected parts. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, local, spoof, vulnerability
systems | linux, windows, ubuntu
advisories | CVE-2021-23961, CVE-2021-23982, CVE-2021-23984, CVE-2021-23987, CVE-2021-23994, CVE-2021-23995, CVE-2021-23999, CVE-2021-24002, CVE-2021-29948, CVE-2021-29949, CVE-2021-29956, CVE-2021-29957
SHA-256 | 81edf153f7a8ff7803ae890c659ea5d9e899b6b778102480a52389ef99c260ee
Seeddms 5.1.10 Remote Command Execution
Posted Jun 25, 2021
Authored by Bryan Leong

Seeddms version 5.1.10 authenticated remote command execution exploit.

tags | exploit, remote
advisories | CVE-2019-12744
SHA-256 | 1bd0d1d11507de31f14c38ecbae34e401a0ca09e54f2d268c40dcd6fc869c58b
Online Pet Shop We App 1.0 SQL Injection / Shell Upload
Posted Jun 25, 2021
Authored by Drew Jones

Online Pet Shop We App version 1.0 suffers from remote SQL injection and shell upload vulnerabilities.

tags | exploit, remote, shell, vulnerability, sql injection
advisories | CVE-2021-35456, CVE-2021-35458
SHA-256 | eb0bd2f27f2879c5379fdf6bc7702bd5bdffceefb5a53170487bbb21eb81cf54
Simple Client Management System 1.0 SQL Injection
Posted Jun 25, 2021
Authored by Baris Yildizoglu

Simple Client Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 3004a065d6a8c63fdece287c1f6038dcc213d293890df2200431cdee20c52de6
JNLP Injection To Multi-OS Code Execution
Posted Jun 25, 2021
Authored by Ken Pyle

Whitepaper discussing BIZARRELOVETRIANGLE and FULLCLIP - JNLP parameter injection attacks to remote, persistent, multi-os code execution.

tags | paper, remote, code execution
SHA-256 | 0544f59a1e884ac5e4753711797fde21b5db764b310bbdc41f2106aa58ffdef4
rConfig Shell Upload
Posted Jun 24, 2021
Authored by Murat Seker, Vishwaraj Bhattrai | Site metasploit.com

This Metasploit module allows an attacker with a privileged rConfig account to start a reverse shell due to an arbitrary file upload vulnerability in /lib/crud/vendors.crud.php.

tags | exploit, arbitrary, shell, php, file upload
SHA-256 | 9898d80071dec7ddeb79d05a6d3e6a34bfd2027a8c1422f650410e9a1cb4219c
Ubuntu Security Notice USN-5004-1
Posted Jun 24, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 5004-1 - It was discovered that RabbitMQ incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 ESM and Ubuntu 18.04 LTS. Jonathan Knudsen discovered RabbitMQ incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2019-11287, CVE-2021-22116
SHA-256 | 59fb5cdf77b530600e46be2c0267cbe788afc97154c7f99aed142ee84bb65cfc
Trojan-Dropper.Win32.Krepper.a MVID-2021-0260 Remote Command Execution
Posted Jun 24, 2021
Authored by malvuln | Site malvuln.com

Trojan-Dropper.Win32.Krepper.a malware suffers from an unauthenticated remote command execution vulnerability.

tags | exploit, remote, trojan
systems | windows
SHA-256 | 707ac72fec5bc9fd4ba9130e172dfe27a762e79efd3ec59ffa42a962275b3eb5
Red Hat Security Advisory 2021-2543-01
Posted Jun 24, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2543-01 - Red Hat OpenShift Jaeger is Red Hat's distribution of the Jaeger project, tailored for installation into an on-premise OpenShift Container Platform installation. Issues addressed include code execution and denial of service vulnerabilities.

tags | advisory, denial of service, vulnerability, code execution
systems | linux, redhat
advisories | CVE-2016-10228, CVE-2017-14502, CVE-2019-25013, CVE-2019-2708, CVE-2019-3842, CVE-2019-9169, CVE-2020-13434, CVE-2020-13776, CVE-2020-13949, CVE-2020-15358, CVE-2020-24977, CVE-2020-26116, CVE-2020-27618, CVE-2020-27619, CVE-2020-28196, CVE-2020-28362, CVE-2020-28500, CVE-2020-29361, CVE-2020-29362, CVE-2020-29363, CVE-2020-8231, CVE-2020-8284, CVE-2020-8285, CVE-2020-8286, CVE-2020-8927, CVE-2021-20305, CVE-2021-23336
SHA-256 | de10f870e361f9c40e606f0ad79acca7e8e375dc5f52949dbafbc84fbfe8b8b3
Trojan-Dropper.Win32.Juntador.a MVID-2021-0259 Weak Hardcoded Password
Posted Jun 24, 2021
Authored by malvuln | Site malvuln.com

Trojan-Dropper.Win32.Juntador.a malware suffers from having a weak hardcoded password.

tags | exploit, trojan
systems | windows
SHA-256 | 7a574e38f522f8965f7c8a735df277dd3ac35d5d518b4ad4ac0f0cedc76c0a85
TP-Link TL-WR841N Command Injection
Posted Jun 24, 2021
Authored by Koh You Liang

TP-Link TL-WR841N suffers from a remote command injection vulnerability.

tags | exploit, remote
advisories | CVE-2020-35575
SHA-256 | f38c375883294d89e59cdd181a489ae666b47d231d5e8deee6d2920dbda52144
Huawei DG8045 Authentication Bypass
Posted Jun 24, 2021
Authored by Abdalrahman Gamal

Huawei DG8045 ships with a default password that is the last 8 character of the device's serial number listed on the back.

tags | exploit, bypass
SHA-256 | f56018859afa47d0e08a86ef2e86ac8c4541f3a4b1b3696aee916b06873e759e
Trojan.Win32.Banpak.kh MVID-2021-0258 Insecure Permissions
Posted Jun 24, 2021
Authored by malvuln | Site malvuln.com

Trojan.Win32.Banpak.kh malware suffers from an insecure permissions vulnerability.

tags | exploit, trojan
systems | windows
SHA-256 | 7a6438ef523763495bf878f9db9d93798a62d8ce9c1607fe615b7059aece6e32
Page 2 of 18
Back12345Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close