what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files Date: 2022-01-03 to 2022-01-04

Haveged 1.9.16
Posted Jan 3, 2022
Site issihosts.com

haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.

Changes: Now allows newuname syscall. Fixed an issue where haveged cannot be run as an application if also running as a daemon. Added entropy unconditionally at the start and then every 60 seconds. New parameter --once to refill entropy once and quit immediately. Added haveged-once.service to provide entropy once (intended for initramfs).
tags | tool
systems | linux, unix
SHA-256 | 6d7ab185c3f5ab8e2203a05aaa0308d3f61edd96799eaab61c9971dc6252185f
SQLMAP - Automatic SQL Injection Tool 1.6
Posted Jan 3, 2022
Authored by Bernardo Damele | Site sqlmap.org

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Changes: Major release bump with a large list of changes over the past year.
tags | tool, web, overflow, arbitrary, vulnerability, sql injection
systems | unix
SHA-256 | 78c654fbffc4af710f11d2be614e198fb5b13e526dd38c960048ae1eadffaf29
Wireshark Analyzer 3.6.1
Posted Jan 3, 2022
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

Changes: Six vulnerabilities related to crashes and infinite loops have been addressed. Eleven bug fixes as well as significant updates relating to protocol support.
tags | tool, sniffer, protocol
systems | windows, unix
advisories | CVE-2021-4181, CVE-2021-4182, CVE-2021-4183, CVE-2021-4184, CVE-2021-4185
SHA-256 | 0434eda8fb6bf88e2b42a67eb5d1de254a67d505bec3bb51fee9d7cad7925a38
Zoom MMR Server Information Leak
Posted Jan 3, 2022
Authored by Google Security Research, natashenka

Zoom suffers from an information leak vulnerability in the MMR server.

tags | exploit
advisories | CVE-2021-34424
SHA-256 | ceaa806e1faea132492fe57be7bbd693988b712326fabb4aec96193d0e3374d0
Red Hat Security Advisory 2022-0003-03
Posted Jan 3, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0003-03 - X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Issues addressed include an out of bounds access vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-4008, CVE-2021-4009, CVE-2021-4010, CVE-2021-4011
SHA-256 | 4987bdc6ea04486a66b72df22c81cd94b1f64631deb89d4680d5fa99d64efe7f
Zoom Chat Message Processing Buffer Overflow
Posted Jan 3, 2022
Authored by Google Security Research, natashenka

Zoom suffers from a buffer overflow vulnerability related to the processing of chat message.

tags | exploit, overflow
advisories | CVE-2021-34423
SHA-256 | a6e816c46fce3985cc7b2b11b9e6f3edebe9b65dcbbbf65037027c3d32e954f0
Red Hat Security Advisory 2022-0001-01
Posted Jan 3, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0001-01 - Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-44716
SHA-256 | 16b511ba4921cedf910127e5f1176b93411a27d26c3df7904d0c5a21d6002169
Backdoor.Win32.SilentSpy.10 MVID-2021-0441 Authentication Race Condition
Posted Jan 3, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.SilentSpy.10 malware suffers from an authentication related race condition vulnerability.

tags | exploit
systems | windows
SHA-256 | 1ac0b7dbaed7a53c71134caabc63b76c9a7d4ded9f7a76f89eab2d0a9eaff37e
WordPress CRM Form Entries Cross Site Scripting
Posted Jan 3, 2022
Authored by Gaetano Perrone | Site secsi.io

WordPress CRM Form Entries versions prior to 1.1.7 appear susceptible to a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2021-25080
SHA-256 | 9b2a5dc4d381f00d8d66a8167361aff8b5627a616bf4ea6649983346499ca217
Backdoor.Win32.SilentSpy.10 MVID-2021-0440 Authentication Bypass / Command Execution
Posted Jan 3, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.SilentSpy.10 malware suffers from authentication bypass and command execution vulnerabilities.

tags | exploit, vulnerability
systems | windows
SHA-256 | b65db49f714e940c9ee6d430755f43aa22faf110a28f42182efc75ac104779e7
Backdoor.Win32.Skrat MVID-2021-0437 Insecure Password Storage
Posted Jan 3, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Skrat malware suffers from an insecure password storage vulnerability.

tags | exploit
systems | windows
SHA-256 | 5649c6950f1c0299b5dc6c880265799e37a83555341bcc6af96eace04380777e
Red Hat Security Advisory 2022-0002-01
Posted Jan 3, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0002-01 - Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-44716
SHA-256 | 47d3139682f18b68f82738438119153365f3f5054d15e0e28c8d7ad5af0853b0
Backdoor.Win32.Fantador MVID-2021-0438 Denial Of Service
Posted Jan 3, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Fantador malware suffers from a denial of service vulnerability.

tags | exploit, denial of service
systems | windows
SHA-256 | f080626a9bfa875cadbd0b0e552603f5db4beacc5cad69456ead594a2654240a
Backdoor.Win32.Fantador MVID-2021-0439 Insecure Password Storage
Posted Jan 3, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Fantador malware suffers from an insecure password storage vulnerability.

tags | exploit
systems | windows
SHA-256 | 630ee6aa907a92985f8e4a30f870bf49de1e5a02c661fadeab13c86d5d8e3772
BeyondTrust Remote Support 6.0 Cross Site Scripting
Posted Jan 3, 2022
Authored by Malcrove

BeyondTrust Remote Support versions 6.0 and below suffer from a cross site scripting vulnerability.

tags | exploit, remote, xss
advisories | CVE-2021-31589
SHA-256 | c974011f5f45022352dcdbc5bd9c817581fc98bdbc3b7b45a41e107214bb693a
Backdoor.Win32.Wollf.m MVID-2021-0436 Authentication Bypass
Posted Jan 3, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Wollf.m malware suffers from a bypass vulnerability.

tags | exploit, bypass
systems | windows
SHA-256 | 8c105c4719383bc2370e193839ad1e30f0bbf32bf36c1ea164e57a56c5c7e57e
Backdoor.Win32.Wollf.m MVID-2021-0435 Weak Hardcoded Password
Posted Jan 3, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Wollf.m malware suffers from having a weak hardcoded password.

tags | exploit
systems | windows
SHA-256 | 643422b0c77d73d83930c3dad737b4297d8bea84ce50ddaf6a3f45bd3deae182
Backdoor.Win32.Jokerdoor MVID-2021-0434 Buffer Overflow
Posted Jan 3, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Jokerdoor malware suffers from a buffer overflow vulnerability.

tags | exploit, overflow
systems | windows
SHA-256 | b8c7fbd4b16710feb9236fd22748c462ef1285f25ffd43e6954b37e5f51481b7
TRIGONE Remote System Monitor 3.61 Unquoted Service Path
Posted Jan 3, 2022
Authored by Yehia Elghaly

TRIGONE Remote System Monitor version 3.61 suffers from an unquoted service path vulnerability.

tags | exploit, remote
SHA-256 | 28f7678973150b8a83c3d661a543bfddd3cf0df66211928cb36387ab3f2bd848
Computer And Mobile Repair Shop Management 1.0 SQL Injection
Posted Jan 3, 2022
Authored by nu11secur1ty

Computer And Mobile Repair Shop Management version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e9bbd415359fbf78c50cb2437b871afe149fc9ed4ba37945a5d5ebc9902ef39a
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close