exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2022-01-10

Haveged 1.9.17
Posted Jan 10, 2022
Site issihosts.com

haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.

Changes: Added new verbose mode.
tags | tool
systems | linux, unix
SHA-256 | 02d9b7c801fbcf16bed43c27bf6ece570b79f4d94561f3eb30883fb5f89c526d
Linux Garbage Collection Memory Corruption
Posted Jan 10, 2022
Authored by Jann Horn, Google Security Research

Linux suffers from a garbage collection memory corruption vulnerability by resurrecting a file reference through RCU.

tags | exploit
systems | linux
advisories | CVE-2021-4083
SHA-256 | 638d1db3f45bcd59a8ce424b7eb6551bbe0ff49ecd4eb9c767f096560f4687de
Red Hat Security Advisory 2022-0047-03
Posted Jan 10, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0047-03 - Openshift Logging Bug Fix Release. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2021-20321, CVE-2021-3712, CVE-2021-42574, CVE-2021-45105
SHA-256 | 75732aa539f8c93b32f7bd1b2b848d4871ecbdfe2368bcf7c6c0ccae796ed3ea
Open-AudIT Community 4.2.0 Cross Site Scripting
Posted Jan 10, 2022
Authored by Dominic Clark

Open-AudIT Community versions 4.2.0 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2021-44916
SHA-256 | a10cd570edd5e66d5661fededcd4391a41661f6640e0b2921726ff74ac9ee9b3
Ubuntu Security Notice USN-5212-2
Posted Jan 10, 2022
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 5212-2 - USN-5212-1 fixed several vulnerabilities in Apache. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. It was discovered that the Apache HTTP Server incorrectly handled certain forward proxy requests. A remote attacker could use this issue to cause the server to crash, resulting in a denial of service, or possibly perform a Server Side Request Forgery attack.

tags | advisory, remote, web, denial of service, vulnerability
systems | linux, ubuntu
advisories | CVE-2021-44224, CVE-2021-44790
SHA-256 | 16d5ff8882fe2a2094f084a8014b7b5b2ff0ac6d902a94cc2a10f9947524ecd6
WordPress Contact Form Entries Cross Site Scripting
Posted Jan 10, 2022
Authored by gx1

WordPress Contact Form Entries plugin versions prior to 1.2.4 suffer from an unauthenticated persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2021-25079
SHA-256 | c6aa22feb391bfa611341a3207a48bd136366a08bc16032ddcc31ead2835bcf9
Red Hat Security Advisory 2022-0044-06
Posted Jan 10, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0044-06 - OpenShift Logging Bug Fix Release. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2020-36327, CVE-2021-20321, CVE-2021-3712, CVE-2021-42574, CVE-2021-45105
SHA-256 | c565c4389f96bbb112673b62c18246178afcc0355fc11d803be3172c0bf9bd68
HTTP Commander 3.1.9 Cross Site Scripting
Posted Jan 10, 2022
Authored by Oscar Sanden

HTTP Commander version 3.1.9 suffers from a persistent cross site scripting vulnerability.

tags | exploit, web, xss
SHA-256 | fbd748c7080c9233fc86799095c771f71f2ba459d54321bcfae17425ad25bf4a
Red Hat Security Advisory 2022-0043-03
Posted Jan 10, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0043-03 - Openshift Logging Bug Fix Release. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2021-20321, CVE-2021-3712, CVE-2021-42574, CVE-2021-45105
SHA-256 | d079fae8eb6ceb0252d08a240487c22383dcf81abdfd564e1d20dca27bc428a5
Online Examination System Project 1.0 SQL Injection
Posted Jan 10, 2022
Authored by nu11secur1ty

Online Examination System Project version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 8ddeb582f6b34d4e9699a8c2d4ee26488c0ac01fbade9d8e51122f2d924d71b2
Online Resort Management System 1.0 SQL Injection
Posted Jan 10, 2022
Authored by nu11secur1ty

Online Resort Management System version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c6700a48b2cca6e8a07c5724bbbe0f4a53b3033cdde82e1f50fdf125f909c4ac
Red Hat Security Advisory 2022-0042-03
Posted Jan 10, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0042-03 - Openshift Logging Bug Fix Release. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2021-20321, CVE-2021-3712, CVE-2021-42574, CVE-2021-45105
SHA-256 | cfa0dd01e2a218c20f34cb015fcdf1836f9175ef7da664dff678a0cd546ea25f
Online Railway Reservation System 1.0 SQL Injection
Posted Jan 10, 2022
Authored by twseptian

Online Railway Reservation System version 1.0 suffers from an unauthenticated remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d7048242b508174806f67a517f2318b931e09fca3c3cfa6fb386e3114b28d408
Online Railway Reservation System 1.0 Remote Code Execution
Posted Jan 10, 2022
Authored by Zachary Asher

Online Railway Reservation System version 1.0 suffers from an unauthenticated remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | eb9b5033d5095e7f75e61c938bcd4cc2fe638bd7189a2d341b0de7462d43f501
Online Railway Reservation System 1.0 Missing Access Control
Posted Jan 10, 2022
Authored by Zachary Asher

Online Railway Reservation System version 1.0 suffers from an administrative account creation vulnerability.

tags | exploit, bypass
SHA-256 | 6e4b17431a06225179106cc2be02dcbc7de9bcd723fe818fa7c839154bf47af2
Online Railway Reservation System 1.0 Cross Site Scripting
Posted Jan 10, 2022
Authored by Zachary Asher

Online Railway Reservation System version 1.0 suffers from multiple persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 2c8cfd056b2c594f9a72d2869b603d7277b3ab2fa80ece1c556e3bf4246aa4b9
VUPlayer 2.49 Buffer Overflow
Posted Jan 10, 2022
Authored by Bryan Leong

VUPlayer version 2.49 .wax local buffer overflow exploit with DEP bypass.

tags | exploit, overflow, local
advisories | CVE-2009-0182
SHA-256 | b8493773b7aa238bf7e0fc70b86a3e7420912d230ee49591057d4eac20b4648f
CoreFTP Server Build 725 Directory Traversal
Posted Jan 10, 2022
Authored by LiamInfosec

CoreFTP server build version 725 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | fbb9c434dc72c64f279fda060263d779095ad8f3f6d61af6696ef0569552805b
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close