exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2022-02-11 to 2022-02-12

Wireshark Analyzer 3.6.2
Posted Feb 11, 2022
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

Changes: 14 dissector vulnerabilities have been fixed. 15 additional bug fixes were added.
tags | tool, sniffer, protocol
systems | windows, unix
SHA-256 | 5d901a5572aef953f04adc253ed2a0699d4c62779d3249021e1e8541a024c30e
nfstream 6.4.2
Posted Feb 11, 2022
Authored by Zied Aouini | Site github.com

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

Changes: Fix for pypi missing wheels.
tags | tool, python
systems | unix
SHA-256 | 7886ae6f181bdaea3668f70071354538267f76d5825c5ae055822fc0bab3518d
SIEMENS-SINEMA Remote Connect 1.0 SP3 HF1 Open Redirection
Posted Feb 11, 2022
Authored by A. Ovsyannikova | Site sec-consult.com

SIEMENS-SINEMA Remote Connect version 1.0 SP3 HF1 suffers from an open redirection vulnerability.

tags | exploit, remote
advisories | CVE-2022-23102
SHA-256 | 2025fbf79c79ed214e16d6403fd3fd60fe1acdc9c72cd918baa2eba0b4448e75
Red Hat Security Advisory 2022-0507-01
Posted Feb 11, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0507-01 - Red Hat JBoss Data Virtualization is a lean data integration solution that provides easy, real-time, and unified data access across disparate sources to multiple applications and users. JBoss Data Virtualization makes data spread across physically distinct systems - such as multiple databases, XML files, and even Hadoop systems - appear as a set of tables in a local database. This Service Pack release of Red Hat JBoss Data Virtualization 6.4.8.SP2 serves as a replacement for Red Hat JBoss Data Virtualization 6.4.8 and Red Hat JBoss Data Virtualization 6.4.8.SP1, and mitigates the impact of the log4j CVE's referenced in this document by removing the affected classes from the patch. Issues addressed include code execution, deserialization, and remote SQL injection vulnerabilities.

tags | advisory, remote, local, vulnerability, code execution, sql injection
systems | linux, redhat
advisories | CVE-2019-17571, CVE-2020-9488, CVE-2021-4104, CVE-2022-23302, CVE-2022-23305, CVE-2022-23307
SHA-256 | fbe91d1bc3ed2e3fbb1fa5ff2f36ba68eca8d2c1b922285bb6706923bbca97ff
Nokia Transport Module Authentication Bypass
Posted Feb 11, 2022
Authored by Cristiano Maruti

The TRS web console allows an authenticated user to remotely manage the BTS and its configuration. Analysis discovered an authentication bypass vulnerability in the web management console. BTS TRS web console version FTM_W20_FP2_2019.08.16_0010 is affected.

tags | exploit, web, bypass
advisories | CVE-2021-31932
SHA-256 | 0f05d6d716250f586c5ca2543716a3b108e48fdb98ec32ec187a2d7388c7a043
Apple Security Advisory 2022-02-10-3
Posted Feb 11, 2022
Authored by Apple | Site apple.com

Apple Security Advisory 2022-02-10-3 - Safari 15.3 addresses code execution and use-after-free vulnerabilities.

tags | advisory, vulnerability, code execution
systems | apple
advisories | CVE-2022-22620
SHA-256 | 9aff010cc56a76b1b22923fd7d12695f4a47ceb08cf3182a39a9c990d7386dc7
Subrion CMS 4.2.1 Cross Site Request Forgery
Posted Feb 11, 2022
Authored by Aryan Chehreghani

Subrion CMS version 4.2.1 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 6e6c416fadc87a9d274f7f783f9c8782d76e31148c30267089cca8b546eb9276
Apple Security Advisory 2022-02-10-2
Posted Feb 11, 2022
Authored by Apple | Site apple.com

Apple Security Advisory 2022-02-10-2 - macOS Monterey 12.2.1 addresses code execution and use-after-free vulnerabilities.

tags | advisory, vulnerability, code execution
systems | apple
advisories | CVE-2022-22620
SHA-256 | 9fac97c54283008502dbdac653d4628b25e4e78862914e9f22aa5ded59aa2435
Accounting Journal Management System 1.0 SQL Injection
Posted Feb 11, 2022
Authored by Alperen Ergel

Accounting Journal Management System version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | f5f528b8f4842123c6d93dbd73e398622f44bb7962173ba773ffa8e13f9f8d05
Apple Security Advisory 2022-02-10-1
Posted Feb 11, 2022
Authored by Apple | Site apple.com

Apple Security Advisory 2022-02-10-1 - iOS 15.3.1 and iPadOS 15.3.1 addresses code execution and use-after-free vulnerabilities.

tags | advisory, vulnerability, code execution
systems | apple, ios
advisories | CVE-2022-22620
SHA-256 | ffb44aa673eb6c378b3be0dc9f7e1c638db809cb42bdd28efcb80d8ac8a39680
Kyocera Command Center RX ECOSYS M2035dn Directory Traversal
Posted Feb 11, 2022
Authored by Luis Martinez

Kyocera Command Center RX version ECOSYS M2035dn suffers from a directory traversal vulnerability that allows for file disclosure.

tags | exploit, file inclusion
SHA-256 | 89cfa42fe3449bfdce8a9117af9911c0470fdb7b8987a421e59b7dbeadeeebde
ICICS 2022 Call For Papers
Posted Feb 11, 2022
Site cyber.kent.ac.uk

The call for papers for the 24th International Conference on Information and Communications Security (ICICS 2022) has been announced. It will take place at the University of Kent, Canterbury, UK on September 5th through the 8th, 2022.

tags | paper, conference
SHA-256 | c5858f9c626e3726677487db4f6dd8a236b35385ed21c9145dda99e6fcb0a1d3
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close