exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2021-08-06 to 2021-08-07

Backdoor.Win32.Zaratustra MVID-2021-0315 Remote File Write / Code Execution
Posted Aug 6, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Zaratustra malware suffers from an unauthenticated remote file write that can be leveraged to execute arbitrary code.

tags | exploit, remote, arbitrary
systems | windows
SHA-256 | faa41ce9f9574c76551b1a0bd647a56d2686eab76ea2617a97e6bd4da7eeca0b
Backdoor.Win32.Zdemon.126 MVID-2021-0314 Remote Command Execution
Posted Aug 6, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Zdemon.126 malware suffers from an unauthenticated remote command execution vulnerability.

tags | exploit, remote
systems | windows
SHA-256 | 6c103f652cd5df632c88bfe56293701fefe049a6baf2e97acd9bd9e2bb99c7fd
Backdoor.Win32.Zdemon.10 MVID-2021-0313 Remote Command Execution
Posted Aug 6, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Zdemon.10 malware suffers from an unauthenticated remote command execution vulnerability.

tags | exploit, remote
systems | windows
SHA-256 | a4eb971ffb286c41820ad7d933a85d0bb5aef03fb9ebafc284b22a6c44bfe20d
Trojan-Dropper.Win32.Small.fp MVID-2021-0312 Unauthenticated Open Proxy
Posted Aug 6, 2021
Authored by malvuln | Site malvuln.com

Trojan-Dropper.Win32.Small.fp malware suffers from an unauthenticated open proxy vulnerability.

tags | exploit, trojan
systems | windows
SHA-256 | edfdede5afcb07fa9935ac8981f1c08fc5f420809392f9e4763212fe798c1996
Constructor.Win32.SS.11.c MVID-2021-0311 Unauthenticated Open Proxy
Posted Aug 6, 2021
Authored by malvuln | Site malvuln.com

Constructor.Win32.SS.11.c malware suffers from an unauthenticated open proxy vulnerability.

tags | exploit
systems | windows
SHA-256 | 4f4c7f05b98ada74125607b5b3a6a0a3115d5ff2eceabed8e8a47c6a46dc4695
Red Hat Security Advisory 2021-3016-01
Posted Aug 6, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-3016-01 - Red Hat Advanced Cluster Management for Kubernetes 2.3.0 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs and security issues. Issues addressed include code execution, cross site scripting, denial of service, integer overflow, and null pointer vulnerabilities.

tags | advisory, denial of service, overflow, vulnerability, code execution, xss
systems | linux, redhat
advisories | CVE-2016-10228, CVE-2017-14502, CVE-2018-1000858, CVE-2018-20843, CVE-2019-13050, CVE-2019-13627, CVE-2019-14889, CVE-2019-15903, CVE-2019-19906, CVE-2019-20454, CVE-2019-20934, CVE-2019-25013, CVE-2019-2708, CVE-2019-9169, CVE-2020-11668, CVE-2020-13434, CVE-2020-15358, CVE-2020-1730, CVE-2020-27618, CVE-2020-28196, CVE-2020-28469, CVE-2020-28500, CVE-2020-28851, CVE-2020-28852, CVE-2020-29361, CVE-2020-29362
SHA-256 | 22af861f19c8cc76d1800e8cdc42e955c8b4fd8d0940dbb11df8626d83990c4b
Ubuntu Security Notice USN-5032-1
Posted Aug 6, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 5032-1 - Several vulnerabilities were fixed in Docker. This update provides a new upstream version that fixed them.

tags | advisory, vulnerability
systems | linux, ubuntu
SHA-256 | 596835ec10eca5e97ca83ad0929ccc260ec89f8264e2b6f89c09e7e8970fbcc3
Red Hat Security Advisory 2021-3020-01
Posted Aug 6, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-3020-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Issues addressed include a code execution vulnerability.

tags | advisory, code execution, ruby
systems | linux, redhat
advisories | CVE-2020-36327, CVE-2021-31799, CVE-2021-31810, CVE-2021-32066
SHA-256 | c6cc28a413af73329b50f0bed720bee159e0591e4902a6b5eb92fb5b4a5fa1ba
Amica Prodigy 1.7 Privilege Escalation
Posted Aug 6, 2021
Authored by Andrea Intilangelo

Amica Prodigy version 1.7 suffers from a local privilege escalation vulnerability.

tags | exploit, local
advisories | CVE-2021-35312
SHA-256 | caec36a86ced790c36d4026e356ea824994c3321f03dc44832a08b9b40c8a551
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close