exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 399 RSS Feed

Files Date: 2021-07-01 to 2021-07-31

hardwear.io 2021 Netherlands Call For Papers
Posted Jul 23, 2021
Authored by hardwear.io CFP

The call for papers for hardwear.io 2021 in the Netherlands is now open. It will take place October 28th through the 29th, 2021 at NH Hotel Den Haag, The Netherlands.

tags | paper, conference
SHA-256 | 68c8cf7a45d193d9d0d1360a6d987ce1ee4b0018bcef8b1a265a29c1fb7d7a14
Apple Security Advisory 2021-07-21-7
Posted Jul 23, 2021
Authored by Apple | Site apple.com

Apple Security Advisory 2021-07-21-7 - Safari 14.1.2 addresses code execution and use-after-free vulnerabilities.

tags | advisory, vulnerability, code execution
systems | apple
advisories | CVE-2021-30758, CVE-2021-30795, CVE-2021-30797
SHA-256 | 704085a2e819a5951d974f27a4837d1d8f0e0185d1faede3ed42513625d1eab2
Apple Security Advisory 2021-07-21-6
Posted Jul 23, 2021
Authored by Apple | Site apple.com

Apple Security Advisory 2021-07-21-6 - tvOS 14.7 addresses buffer overflow, bypass, code execution, integer overflow, out of bounds read, out of bounds write, and use-after-free vulnerabilities.

tags | advisory, overflow, vulnerability, code execution
systems | apple
advisories | CVE-2021-30758, CVE-2021-30759, CVE-2021-30760, CVE-2021-30768, CVE-2021-30769, CVE-2021-30770, CVE-2021-30773, CVE-2021-30774, CVE-2021-30775, CVE-2021-30776, CVE-2021-30779, CVE-2021-30780, CVE-2021-30781, CVE-2021-30785, CVE-2021-30788, CVE-2021-30789, CVE-2021-30795, CVE-2021-30797, CVE-2021-30802, CVE-2021-3518
SHA-256 | 15e206ef34c8acb3c4b84465c1f65a0de257d34e15421f31b0b4d02179e52590
Apple Security Advisory 2021-07-21-5
Posted Jul 23, 2021
Authored by Apple | Site apple.com

Apple Security Advisory 2021-07-21-5 - watchOS 7.6 addresses buffer overflow, bypass, code execution, integer overflow, out of bounds read, out of bounds write, and use-after-free vulnerabilities.

tags | advisory, overflow, vulnerability, code execution
systems | apple
advisories | CVE-2021-30758, CVE-2021-30759, CVE-2021-30760, CVE-2021-30763, CVE-2021-30768, CVE-2021-30769, CVE-2021-30770, CVE-2021-30773, CVE-2021-30774, CVE-2021-30775, CVE-2021-30776, CVE-2021-30779, CVE-2021-30780, CVE-2021-30781, CVE-2021-30785, CVE-2021-30788, CVE-2021-30789, CVE-2021-30795, CVE-2021-30797, CVE-2021-30798, CVE-2021-3518
SHA-256 | f1b361d5c80fd26cdf30aee03346f0e7d1e462f2a4cef5e95296af910ccc7ec5
Apple Security Advisory 2021-07-21-4
Posted Jul 23, 2021
Authored by Apple | Site apple.com

Apple Security Advisory 2021-07-21-4 - Security Update 2021-005 Mojave addresses code execution, double free, information leakage, integer overflow, out of bounds read, and out of bounds write vulnerabilities.

tags | advisory, overflow, vulnerability, code execution
systems | apple
advisories | CVE-2021-30672, CVE-2021-30677, CVE-2021-30703, CVE-2021-30733, CVE-2021-30759, CVE-2021-30760, CVE-2021-30765, CVE-2021-30766, CVE-2021-30777, CVE-2021-30780, CVE-2021-30781, CVE-2021-30782, CVE-2021-30783, CVE-2021-30787, CVE-2021-30788, CVE-2021-30790, CVE-2021-30793, CVE-2021-30796, CVE-2021-30799, CVE-2021-30805
SHA-256 | e21f56d5a667fcc5ff7b65c8716a46a90e4fa303e50daa8548cf0fc30181d8d7
ElasticSearch 7.13.3 Memory Disclosure
Posted Jul 23, 2021
Authored by r0ny

ElasticSearch version 7.13.3 memory disclosure exploit.

tags | exploit, info disclosure
advisories | CVE-2021-22145
SHA-256 | 9a4add6c13c0ca5bf368c54fa1101802fefdcef94378b62f10449135ae596c5c
Apple Security Advisory 2021-07-21-3
Posted Jul 23, 2021
Authored by Apple | Site apple.com

Apple Security Advisory 2021-07-21-3 - Security Update 2021-004 Catalina addresses buffer overflow, code execution, double free, information leakage, integer overflow, out of bounds read, and out of bounds write vulnerabilities.

tags | advisory, overflow, vulnerability, code execution
systems | apple
advisories | CVE-2021-30672, CVE-2021-30677, CVE-2021-30703, CVE-2021-30731, CVE-2021-30733, CVE-2021-30759, CVE-2021-30760, CVE-2021-30765, CVE-2021-30766, CVE-2021-30768, CVE-2021-30775, CVE-2021-30776, CVE-2021-30777, CVE-2021-30780, CVE-2021-30781, CVE-2021-30782, CVE-2021-30783, CVE-2021-30785, CVE-2021-30787, CVE-2021-30788, CVE-2021-30789, CVE-2021-30790, CVE-2021-30793, CVE-2021-30796, CVE-2021-30799, CVE-2021-30805
SHA-256 | b3d2847fff9a95383950811d3cc281863681b89bbc0181e1f8fbd3f3f4a72b74
Apple Security Advisory 2021-07-21-2
Posted Jul 23, 2021
Authored by Apple | Site apple.com

Apple Security Advisory 2021-07-21-2 - macOS Big Sur 11.5 addresses buffer overflow, bypass, code execution, information leakage, integer overflow, out of bounds read, out of bounds write, and use-after-free vulnerabilities.

tags | advisory, overflow, vulnerability, code execution
systems | apple
advisories | CVE-2021-30748, CVE-2021-30758, CVE-2021-30759, CVE-2021-30760, CVE-2021-30765, CVE-2021-30766, CVE-2021-30768, CVE-2021-30772, CVE-2021-30774, CVE-2021-30775, CVE-2021-30776, CVE-2021-30777, CVE-2021-30778, CVE-2021-30779, CVE-2021-30780, CVE-2021-30781, CVE-2021-30782, CVE-2021-30783, CVE-2021-30784, CVE-2021-30785, CVE-2021-30786, CVE-2021-30787, CVE-2021-30788, CVE-2021-30789, CVE-2021-30790, CVE-2021-30791
SHA-256 | f1b1ad2b7946e49168d2827b239b02d15826660e1fe96ee4118da01db9e6d196
Apple Security Advisory 2021-07-21-1
Posted Jul 23, 2021
Authored by Apple | Site apple.com

Apple Security Advisory 2021-07-21-1 - iOS 14.7 and iPadOS 14.7 addresses buffer overflow, bypass, code execution, integer overflow, out of bounds read, out of bounds write, and use-after-free vulnerabilities.

tags | advisory, overflow, vulnerability, code execution
systems | apple, ios
advisories | CVE-2018-25010, CVE-2018-25011, CVE-2018-25014, CVE-2020-36328, CVE-2020-36329, CVE-2020-36330, CVE-2020-36331, CVE-2021-30748, CVE-2021-30758, CVE-2021-30759, CVE-2021-30760, CVE-2021-30763, CVE-2021-30768, CVE-2021-30769, CVE-2021-30770, CVE-2021-30773, CVE-2021-30774, CVE-2021-30775, CVE-2021-30776, CVE-2021-30779, CVE-2021-30780, CVE-2021-30781, CVE-2021-30785, CVE-2021-30786, CVE-2021-30788, CVE-2021-30789
SHA-256 | 29358ea6cdd8675eaaf91eba676a9319ca50958300cb7768aafeb2307f7ade9a
Microsoft SharePoint Server 2019 Remote Code Execution
Posted Jul 23, 2021
Authored by Soroush Dalili, West Shepherd, Steven Seele

Microsoft SharePoint Server 2019 remote code execution exploit.

tags | exploit, remote, code execution
advisories | CVE-2020-1147
SHA-256 | 46e9d1239eeb594d08bb2032164a87b9a5b13bfc22da02cdddd6ca552f3b5850
Gentoo Linux Security Advisory 202107-52
Posted Jul 23, 2021
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202107-52 - Multiple vulnerabilities have been found in Apache Velocity, the worst of which could result in the arbitrary execution of code. Versions less than 2.3 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2020-13936, CVE-2020-13959
SHA-256 | a151f0d600f0a5f670087824f86c2e5c25a0bbb058b16243c5cc875ab0913975
Gentoo Linux Security Advisory 202107-51
Posted Jul 23, 2021
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202107-51 - Multiple vulnerabilities have been found in IcedTeaWeb, the worst of which could result in the arbitrary execution of code. Versions less than 1.8.4-r1 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2019-10181, CVE-2019-10185
SHA-256 | a0774dc797109d9b3618c661a3e98a6c00269145ee292208e88d6da3e2c1fdd4
WordPress Simple Post 1.1 Cross Site Scripting
Posted Jul 23, 2021
Authored by Vikas Srivastava

WordPress Simple Post plugin version 1.1 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 5399db22e471fc6f6d3d5b99b5680ea7c890cd13fb99ab57ac400213e2b6b770
Asterisk Project Security Advisory - AST-2021-009
Posted Jul 22, 2021
Authored by Kevin Harwell, Andrew Yager | Site asterisk.org

Depending on the timing, it is possible for Asterisk to crash when using a TLS connection if the underlying socket parent/listener gets destroyed during the handshake.

tags | advisory
advisories | CVE-2021-32686
SHA-256 | f908e37fa6bf92ff245d1f52190b304b3ef6738cc22397a7a0ad4665b63b3f39
Asterisk Project Security Advisory - AST-2021-008
Posted Jul 22, 2021
Authored by Kevin Harwell, Michael Welk | Site asterisk.org

If the IAX2 channel driver receives a packet that contains an unsupported media format it can cause a crash to occur in Asterisk.

tags | advisory
advisories | CVE-2021-32558
SHA-256 | 4b4013dde28ebd85bf26ab9c3fd8cf604c2de2c7aacef317b575436966ddf0a0
Asterisk Project Security Advisory - AST-2021-007
Posted Jul 22, 2021
Authored by Joshua Colp, Ivan Poddubny | Site asterisk.org

When Asterisk receives a re-INVITE without SDP after having sent a BYE request a crash will occur. This occurs due to the Asterisk channel no longer being present while code assumes it is.

tags | advisory
advisories | CVE-2021-31878
SHA-256 | ed776e0af45a5b2a169abf425e456827171d23d6768bff6373779d772dd49e62
Ubuntu Security Notice USN-5021-1
Posted Jul 22, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 5021-1 - Harry Sintonen and Tomas Hoger discovered that curl incorrectly handled TELNET connections when the -t option was used on the command line. Uninitialized data possibly containing sensitive information could be sent to the remote server, contrary to expectations. Harry Sintonen discovered that curl incorrectly reused connections in the connection pool. This could result in curl reusing the wrong connections. Various other issues were also addressed.

tags | advisory, remote
systems | linux, ubuntu
advisories | CVE-2021-22898, CVE-2021-22924, CVE-2021-22925
SHA-256 | 7ac8b3d2c694f2858e4713261d1ae24b6f8a1aae63be74dbdc2984959e7d4c58
Red Hat Security Advisory 2021-2866-01
Posted Jul 22, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2866-01 - The ovirt-engine package provides the Red Hat Virtualization Manager, a centralized management platform that allows system administrators to view and manage virtual machines. The Manager provides a comprehensive range of features including search capabilities, resource management, live migrations, and virtual infrastructure provisioning. The ovirt-ansible-hosted-engine-setup package provides an Ansible role for deploying Red Hat Virtualization Hosted-Engine.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-3447
SHA-256 | d6d9da65f13da7bd76c524af0be7f2b3807d6a80218366fd83a1fcb23d20f182
Red Hat Security Advisory 2021-2865-01
Posted Jul 22, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2865-01 - The ovirt-engine package provides the manager for virtualization environments. This manager enables admins to define hosts and networks, as well as to add storage, create VMs and manage user permissions. Issues addressed include code execution and denial of service vulnerabilities.

tags | advisory, denial of service, vulnerability, code execution
systems | linux, redhat
advisories | CVE-2020-28469, CVE-2020-7733, CVE-2021-23343, CVE-2021-23358
SHA-256 | ce9968ff4577033a91a08ac4e693f7ae3c886e4bcb370b3eb85795db47a2a9d5
Red Hat Security Advisory 2021-2736-01
Posted Jul 22, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2736-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include a use-after-free vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-33034, CVE-2021-33909, CVE-2021-33910, CVE-2021-3447
SHA-256 | 1fa632f28d5e605ea0ec82cfb7ecd3c710ed64a96ecae4e68f689247c4013aa9
Red Hat Security Advisory 2021-2779-01
Posted Jul 22, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2779-01 - The OpenJDK 11 packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. This release of the Red Hat build of OpenJDK 11 for Windows serves as a replacement for the Red Hat build of OpenJDK 11 and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.

tags | advisory, java
systems | linux, redhat, windows
advisories | CVE-2021-2341, CVE-2021-2369, CVE-2021-2388
SHA-256 | aacb10ef0b6fd4316b022328b4531163cd36123f2e4c9fc9bcd4b4a84e971e43
Red Hat Security Advisory 2021-2780-01
Posted Jul 22, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2780-01 - The OpenJDK 11 packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. This release of the Red Hat build of OpenJDK 11 for portable Linux serves as a replacement for the Red Hat build of OpenJDK 11 and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.

tags | advisory, java
systems | linux, redhat
advisories | CVE-2021-2341, CVE-2021-2369, CVE-2021-2388
SHA-256 | 4834f7a89b1c105c8c634d270a29e092dfbba1336b090fde6cfce50e35c48a75
Red Hat Security Advisory 2021-2777-01
Posted Jul 22, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2777-01 - The OpenJDK 8 packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. This release of the Red Hat build of OpenJDK 8 for Windows serves as a replacement for the Red Hat build of OpenJDK 8 and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.

tags | advisory, java
systems | linux, redhat, windows
advisories | CVE-2021-2341, CVE-2021-2369, CVE-2021-2388
SHA-256 | 39701e076729f2dbf50ed75ccf5d34ae1a75adac7c46b433300189fdc0d76b7a
Red Hat Security Advisory 2021-2778-01
Posted Jul 22, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2778-01 - The OpenJDK 8 packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. This release of the Red Hat build of OpenJDK 8 for portable Linux serves as a replacement for the Red Hat build of OpenJDK 8 and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.

tags | advisory, java
systems | linux, redhat
advisories | CVE-2021-2341, CVE-2021-2369, CVE-2021-2388
SHA-256 | 1c017048ac46160e63782702866696d00843d69e0de717523dd8f8d936db5f02
Lynis Auditing Tool 3.0.6
Posted Jul 22, 2021
Authored by Michael Boelen | Site cisofy.com

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Changes: OS detection added for Artix Linux, macOS Monterey, NethServer, openSUSE MicroOS. Added a check for outdated translation files. 9 additional changes.
tags | tool, scanner
systems | unix
SHA-256 | 3005346e90339c18a4c626169c6f1d9fb8643bb0d0a049bcaf64b7ccb4fd272c
Page 4 of 16
Back23456Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close