what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2021-10-14 to 2021-10-15

WebKit DOMWindow::open Heap Use-After-Free
Posted Oct 14, 2021
Authored by Google Security Research, Glazvunov

WebKit suffers from a heap use-after-free vulnerability in DOMWindow::open.

tags | exploit
advisories | CVE-2021-30849
SHA-256 | 1ce53d65a9cc597e9e50a3e264ce0d880897dd9133738769858924fe26e913a5
WebKit EventHandler::keyEvent Heap Use-After-Free
Posted Oct 14, 2021
Authored by Google Security Research, Glazvunov

WebKit suffers from a heap use-after-free vulnerability in EventHandler::keyEvent.

tags | exploit
advisories | CVE-2021-30848
SHA-256 | 7eabdea043659a894f5b12f74294c859932c851d4c626dd836dd8073af4422d8
WebKit PointerCaptureController::processPendingPointerCapture Heap Use-After-Free
Posted Oct 14, 2021
Authored by Google Security Research, Glazvunov

WebKit suffers from a heap use-after-free vulnerability in PointerCaptureController::processPendingPointerCapture.

tags | exploit
advisories | CVE-2021-30846
SHA-256 | 6ce184daf47d381bec0f093becdd7a23020d24e4485f1163f06267303f984ecc
Yellowfin Cross Site Scripting / Insecure Direct Object Reference
Posted Oct 14, 2021
Authored by Michele Di Bonaventura

Yellowfin versions prior to 9.6.1 suffer from persistent cross site scripting and insecure direct object reference vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2021-36387, CVE-2021-36388, CVE-2021-36389
SHA-256 | a75e1219ec6542b9cd32d3ece01efb8d1aeb909324898cf57695ad502378204a
IFSC Code Finder Project 1.0 SQL Injection
Posted Oct 14, 2021
Authored by nu11secur1ty

IFSC Code Finder Project version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2021-42224
SHA-256 | 34eebf873c00c50b2ace6b2b21cf2664d6febc7f378d7e71ee9b7b381b21672e
Red Hat Security Advisory 2021-3856-01
Posted Oct 14, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-3856-01 - The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Issues addressed include a server-side request forgery vulnerability.

tags | advisory, web
systems | linux, redhat
advisories | CVE-2021-40438
SHA-256 | 21442766b306af4387511d5a671db6cbb71747bfe90874ec7ecca6f39a40e53f
TextPattern CMS 4.8.7 Shell Upload
Posted Oct 14, 2021
Authored by Mert Das

TextPattern CMS version 4.8.7 suffers from an authenticated remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | e4f760b4dcb97961d49379334bb43bec3ff76fcb8f034f03665d3aca59b918b7
Red Hat Security Advisory 2021-3851-01
Posted Oct 14, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-3851-01 - Red Hat 3scale API Management delivers centralized API management features through a distributed, cloud-hosted layer. It includes built-in features to help in building a more successful API program, including access control, rate limits, payment gateway integration, and developer experience tools. This advisory is intended to use with Container Images, for Red Hat 3scale API Management 2.11.0. Issues addressed include a cross site scripting vulnerability.

tags | advisory, xss
systems | linux, redhat
advisories | CVE-2020-8911, CVE-2020-8912, CVE-2021-22922, CVE-2021-22923, CVE-2021-22924, CVE-2021-27218, CVE-2021-3442, CVE-2021-36222, CVE-2021-3653, CVE-2021-3715, CVE-2021-37750
SHA-256 | e4888f040246d49c7a7c2e4f31bece8b08efa09009b3ee41382c5876a9bfdbbc
SolarWinds Kiwi CatTools 3.11.8 Unquoted Service Path
Posted Oct 14, 2021
Authored by Mert Das

SolarWinds Kiwi CatTools version 3.11.8 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | b3e693f9822774d43506965c835756b120fb514cb5655fe476e1718d64054662
Brute-Force Login And Bypass Account Lockout On elabFTW 1.8.5
Posted Oct 14, 2021
Authored by samguy

Whitepaper that gives an overview on brute-forcing login and bypassing account lockout on elabFTW version 1.8.5.

tags | paper, cracker
SHA-256 | 094a251f151a7eb62b59cfd2e713ac0c84510e643ec38087d3cafab6380e06e8
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close