what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2021-06-08

Red Hat Security Advisory 2021-2291-01
Posted Jun 8, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2291-01 - The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-30465
SHA-256 | 7a856263ba9fa137ae95cff9bcf0a3e7b7a5977f6bcf668df9a819046fb4db79
Red Hat Security Advisory 2021-2292-01
Posted Jun 8, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2292-01 - The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-30465
SHA-256 | 8cb1cdec882b94663495dd31dcb1227a255922ebabecd056e90f016b82eecc5b
SQLMAP - Automatic SQL Injection Tool 1.5.6
Posted Jun 8, 2021
Authored by Bernardo Damele | Site sqlmap.org

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Changes: Minor release with no notes in the changelog.
tags | tool, web, overflow, arbitrary, vulnerability, sql injection
systems | unix
SHA-256 | adc5feaf873ca6f50d4a1f3cf9d047b20c4e12733355528acb467926c6c375f1
COVID-19 Testing Management System 1.0 SQL Injection
Posted Jun 8, 2021
Authored by nu11secur1ty

COVID-19 Testing Management System version 1.0 remote SQL injection exploit based upon the original discovery by Rohit Burke in May of 2021.

tags | exploit, remote, sql injection
advisories | CVE-2021-33470
SHA-256 | 0a0103bf0a7eac9dcea23976913fe85ee3e02bab59a17d48ed4103f626bfc8c4
Red Hat Security Advisory 2021-2290-01
Posted Jun 8, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2290-01 - nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.

tags | advisory, web, protocol
systems | linux, redhat
advisories | CVE-2021-23017
SHA-256 | 1651d0dd6c4d8e6407c692a21c98162f056535fdccc533aa9812afe1ddf2044f
WordPress wpDiscuz 7.0.4 Remote Code Execution
Posted Jun 8, 2021
Authored by Fellipe Oliveira

WordPress wpDiscuz plugin version 7.0.4 unauthenticated remote code execution exploit.

tags | exploit, remote, code execution
advisories | CVE-2020-24186
SHA-256 | aa63e68f2bfdeedda7921d223b7b89c35603743db979d8834247d72fc6863c1e
Red Hat Security Advisory 2021-2285-01
Posted Jun 8, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2285-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2021-3347
SHA-256 | fc3dcdcc018fc8b3d555175305ab4701676cf4330fa406d94eb512b7148d1a43
How To Find WordPress Plugin Vulns
Posted Jun 8, 2021
Authored by WPScan | Site wpscan.com

This e-book gives an overview of how to approach assessing WordPress plugins for vulnerabilities and common vectors of attack.

tags | paper, vulnerability
SHA-256 | e66d1b3feb40251693712a7381b3bf18fb112a40e5a99d570e55530e8cadfbfa
SAMI FTP Server 2.0.2 Denial Of Service
Posted Jun 8, 2021
Authored by Fernando Mengali

SAMI FTP server version 2.0.2 USER denial of service exploit.

tags | exploit, denial of service
SHA-256 | 25a4a57d6e3e422c4340c8395e9311a2f0730affee280f28bc5b0991b67ac307
Red Hat Security Advisory 2021-2280-01
Posted Jun 8, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2280-01 - Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space.

tags | advisory, kernel, cryptography, python
systems | linux, redhat
advisories | CVE-2021-20305
SHA-256 | 25a368fa3e5e2ba5618296e78e07cf7dddc9a96c8c3b675919627a7ed133283b
Cracking pi-hole Passwords
Posted Jun 8, 2021
Authored by Salman Asad

This is a research paper that gives an overview of cracking pi-hole password hashes.

tags | paper
SHA-256 | 687155fdc445a42788cc41d3f903e89b54bbc18bb85f359808d45b10b2e51fe3
Backup Key Recovery 2.2.7 Denial Of Service
Posted Jun 8, 2021
Authored by Erick Galindo

Backup Key Recovery version 2.2.7 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 5313ee140404bec4a35ec6829e43e9c6c4d80154bedf788db495bda9fd663f93
Nsauditor 3.2.3 Denial Of Service
Posted Jun 8, 2021
Authored by Erick Galindo

Nsauditor version 3.2.3 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 1aeacf98dbebae486ebefc55c18e33f2aa97285b6c5d9cf672da18199fad725a
NBMonitor 1.6.8 Denial Of Service
Posted Jun 8, 2021
Authored by Erick Galindo

NBMonitor version 1.6.8 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | be60d91f579e33d61a9d36e23b1378d93a50d75e9ef303751a074c2f7a1baf9c
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close