what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 343 RSS Feed

Files Date: 2021-09-01 to 2021-09-30

WordPress Wappointment 2.2.4 Cross Site Scripting
Posted Sep 27, 2021
Authored by Renos Nikolaou

WordPress Wappointment plugin version 2.2.4 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 0ec2de8d6b3e7c213f925b6bf7c1a9f7fa2dd529191d328cb5129e5f0ca43245
Backdoor.Win32.Hupigon.afjk MVID-2021-0351 Directory Traversal
Posted Sep 27, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Hupigon.afjk malware suffers from a directory traversal vulnerability.

tags | exploit
systems | windows
SHA-256 | d43696509b1d079ab11a9230faf15e7121c44dabdb639bf4f8f247da5e678d97
CMS Made Simple 2.1.3 Remote Code Execution
Posted Sep 27, 2021
Authored by Raed Ahsan

CMS Made Simple version 2.1.3 details on how to achieve remote code execution.

tags | exploit, remote, code execution
SHA-256 | 7b3459513dec24564aa30a512ffef2b5d1b795047278d892848f4efdab0eb7cc
Library System 1.0 SQL Injection
Posted Sep 27, 2021
Authored by Vinay Bhuria

Library System version 1.0 suffers from a remote SQL injection vulnerability. Original discovery of SQL injection in this version is attributed to Aitor Herrero in January of 2021.

tags | exploit, remote, sql injection
SHA-256 | eb854621eb94dfe51e7c8783a6ace3f21838ab76409df3a060deec311572353c
Backdoor.Win32.Hupigon.afjk MVID-2021-0350 Authentication Bypass / Code Execution
Posted Sep 27, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Hupigon.afjk malware suffers from bypass and code execution vulnerabilities.

tags | exploit, vulnerability, code execution
systems | windows
SHA-256 | 3789a2c7b0f6ca3d18975f82d38fd4946423b730c882367fe89c3532b522752b
XAMPP 7.4.3 Privilege Escalation
Posted Sep 27, 2021
Authored by Salman Asad

XAMPP version 7.4.3 suffers from a local privilege escalation vulnerability.

tags | exploit, local
advisories | CVE-2020-11107
SHA-256 | 0f5c7877625783cce13ce18ad512bfe8d734d9d56724b3d2d03dd5e65b70849a
Backdoor.Win32.Hupigon.fjcd MVID-2021-0349 Unauthenticated Open Proxy
Posted Sep 27, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Hupigon.fjcd malware suffers from an unauthenticated open proxy vulnerability.

tags | exploit
systems | windows
SHA-256 | 7de0bdc194e9a195fd15f5c530731f710ddb394ce0942d22da142be4871e92c4
Backdoor.Win32.RmtSvc.l MVID-2021-0348 Denial Of Service
Posted Sep 27, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.RmtSvc.l malware suffers from a denial of service vulnerability.

tags | exploit, denial of service
systems | windows
SHA-256 | 7d8120cf6e5bc376034abd303564b5f0fc177eff78ec31c21e5e6838e9ec741b
Backdoor.Win32.Agent.aer MVID-2021-0347 Insecure Transit / Password Disclosure
Posted Sep 27, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Agent.aer malware suffers from an insecure transit vulnerability that allows for password disclosure.

tags | exploit
systems | windows
SHA-256 | 82907adb2d7ecb4c6e6ea602ffe8c252d98ed152468ed0e2f2d0c16894ca4ad2
Cisco Small Business RV130W 1.0.3.44 Injection
Posted Sep 27, 2021
Authored by Michael Alamoot

Cisco Small Business RV130W version 1.0.3.44 exploit that injects counterfeit routers.

tags | exploit
systems | cisco
SHA-256 | 9ed47dde50d98da582e5d59d6001b33156cd31eb809f23d7ab77bd1c630c5a6a
Ether MP3 CD Burner 1.3.8 Buffer Overflow
Posted Sep 27, 2021
Authored by Achilles

Ether MP3 CD Burner version 1.3.8 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 38045f1e0ebf2d489d9eb899bc1be79fc0401a50f3e8f8e83b9685b5d8606206
Backdoor.Win32.Agent.aer MVID-2021-0346 Denial Of Service
Posted Sep 27, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Agent.aer malware suffers from a denial of service vulnerability.

tags | exploit, denial of service
systems | windows
SHA-256 | 6b8cd0c45d2977584957ed345ebad70c13f8edd94a144cc645cf10bf595862eb
Trojan-Downloader.Win32.VB.abb MVID-2021-0345 Insecure Permissions
Posted Sep 27, 2021
Authored by malvuln | Site malvuln.com

Trojan-Downloader.Win32.VB.abb malware suffers from an insecure permissions vulnerability.

tags | exploit, trojan
systems | windows
SHA-256 | 64e272a1e2097a25247ad10b5a8dcc3752c5438e31d03242bc1673fcdbc280e3
PASS-PHP 1.0 SQL Injection / Cross Site Scripting
Posted Sep 27, 2021
Authored by nu11secur1ty

PASS-PHP version 1.0 suffers from remote SQL injection and cross site scripting vulnerabilities.

tags | exploit, remote, php, vulnerability, xss, sql injection
SHA-256 | 1145a2df44f5b9647b8ad4207215a93abb5fe637fa0a66c4b4596511a4b1e5f5
Cyberfox Web Brwoser 52.9.1 Denial Of Service
Posted Sep 26, 2021
Authored by Aryan Chehreghani

Cyberfox Web Browser version 52.9.1 suffers from a denial of service vulnerability.

tags | exploit, web, denial of service
SHA-256 | 91cedc607c247a9d2ae43187ae47251253916f2aaf1046b2e51ec51a00e2f241
OWASP TimeGap Theory Handbook
Posted Sep 25, 2021
Authored by Abhi M Balakrishnan

This is the OWASP TimeGap Theory handbook that discusses TOC/TOU vulnerabilities.

tags | paper, vulnerability
SHA-256 | 3fa653fadddee02d336d318a62bba714ded87e3ad0707724dc715175cf443fc2
Red Hat Security Advisory 2021-3653-01
Posted Sep 24, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-3653-01 - Red Hat Advanced Cluster Management 2.1.11 security fix and container updates are available.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-27777, CVE-2021-22555, CVE-2021-22922, CVE-2021-22923, CVE-2021-22924, CVE-2021-23017, CVE-2021-29154, CVE-2021-29650, CVE-2021-31535, CVE-2021-32399, CVE-2021-36222, CVE-2021-3653, CVE-2021-37750
SHA-256 | 15f863255ce01b9af4125b6f699165597020889114335a232c7f75076dc7e35c
OpenVPN Monitor 1.1.3 Cross Site Request Forgery
Posted Sep 24, 2021
Authored by Sylvain Heiniger, Emanuel Duss

OpenVPN Monitor versions 1.1.3 and below suffer from a cross site request forgery vulnerability that allows an attacker to disconnect arbitrary VPN clients.

tags | exploit, arbitrary, csrf
advisories | CVE-2021-31604
SHA-256 | 1f3480045376cc0f2cd806ce155a2c7af1486e8d2504fc839a567a574a2ca25d
Apple Security Advisory 2021-09-23-2
Posted Sep 24, 2021
Authored by Apple | Site apple.com

Apple Security Advisory 2021-09-23-2 - Security Update 2021-006 Catalina addresses a code execution vulnerability.

tags | advisory, code execution
systems | apple
advisories | CVE-2021-30869
SHA-256 | 760a08e971b14a8b3d199292204bb1822b459acc9a413ce89f93f316f4d7d46a
Red Hat Security Advisory 2021-3660-01
Posted Sep 24, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-3660-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.1 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.0 and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.1 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include code execution, cross site scripting, denial of service, and traversal vulnerabilities.

tags | advisory, java, denial of service, vulnerability, code execution, xss
systems | linux, redhat
advisories | CVE-2020-13936, CVE-2021-21295, CVE-2021-21409, CVE-2021-28170, CVE-2021-29425, CVE-2021-3536, CVE-2021-3597, CVE-2021-3642, CVE-2021-3644, CVE-2021-3690
SHA-256 | 8bbceba9cbd43ed995bb0158809bfa86c293205d85398c40f9274bb087d0a7b4
OpenVPN Monitor 1.1.3 Command Injection
Posted Sep 24, 2021
Authored by Sylvain Heiniger, Emanuel Duss

OpenVPN Monitor versions 1.1.3 and below suffer from an injection vulnerability that allows an attacker to inject arbitrary commands into the OpenVPN server management interface socket.

tags | exploit, arbitrary
advisories | CVE-2021-31605
SHA-256 | 4aac8e5a6173c4bf869dd5a55f56e9c252331247d5ba381aa933566cb18beba6
Apple Security Advisory 2021-09-23-1
Posted Sep 24, 2021
Authored by Apple | Site apple.com

Apple Security Advisory 2021-09-23-1 - iOS 12.5.5 addresses code execution, integer overflow, and use-after-free vulnerabilities.

tags | advisory, overflow, vulnerability, code execution
systems | apple, ios
advisories | CVE-2021-30858, CVE-2021-30860, CVE-2021-30869
SHA-256 | beac8839ec4a337a5772b10bfb87dd0706785ded91d5f64cec923c300438f091
Red Hat Security Advisory 2021-3658-01
Posted Sep 24, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-3658-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.1 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.0 and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.1 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include code execution, cross site scripting, denial of service, and traversal vulnerabilities.

tags | advisory, java, denial of service, vulnerability, code execution, xss
systems | linux, redhat
advisories | CVE-2020-13936, CVE-2021-21295, CVE-2021-21409, CVE-2021-28170, CVE-2021-29425, CVE-2021-3536, CVE-2021-3597, CVE-2021-3642, CVE-2021-3644, CVE-2021-3690
SHA-256 | 0c1ca183150c4fd0104f07fbd5ecaa37a253605e363351d7d98a6c4fd259f6f4
Red Hat Security Advisory 2021-3656-01
Posted Sep 24, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-3656-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.1 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.0 and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.1 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include code execution, cross site scripting, denial of service, and traversal vulnerabilities.

tags | advisory, java, denial of service, vulnerability, code execution, xss
systems | linux, redhat
advisories | CVE-2020-13936, CVE-2021-21295, CVE-2021-21409, CVE-2021-28170, CVE-2021-29425, CVE-2021-3536, CVE-2021-3597, CVE-2021-3642, CVE-2021-3644, CVE-2021-3690
SHA-256 | 08a3af8cbe1870441f18018302c3b12597f297139b17c3e59677079ae81cc243
OpenVPN Monitor 1.1.3 Authorization Bypass / Denial Of Service
Posted Sep 24, 2021
Authored by Sylvain Heiniger, Emanuel Duss

OpenVPN Monitor versions 1.1.3 and below suffer from an authorization bypass vulnerability that allows an attacker to disconnect arbitrary clients, even if the disconnect feature is disabled.

tags | exploit, arbitrary, bypass
advisories | CVE-2021-31606
SHA-256 | 44443d6d17ea4c88ab04491310bc5cbff119d5c6333513c5f92e9d957fcdc127
Page 3 of 14
Back12345Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close