Quantcast
Channel: Files Date: 2021-04-19 to 2021-04-20 ≈ Packet Storm
Browsing all 19 articles
Browse latest View live

Trojan.Win32.Agentb.iofv Insecure Permissions

Trojan.Win32.Agentb.iofv malware suffers from an insecure permissions vulnerability.

View Article



Trojan.Win32.NanoBot.onh Insecure Permissions

Trojan.Win32.NanoBot.onh malware suffers from an insecure permissions vulnerability.

View Article

Trojan-Dropper.Win32.Agent.bjtzcp Insecure Permissions

Trojan-Dropper.Win32.Agent.bjtzcp malware suffers from an insecure permissions vulnerability.

View Article

Red Hat Security Advisory 2021-1243-01

Red Hat Security Advisory 2021-1243-01 - Red Hat Directory Server is an LDAPv3-compliant directory server. The suite of packages includes the Lightweight Directory Access Protocol server, as well as...

View Article

Red Hat Security Advisory 2021-1241-01

Red Hat Security Advisory 2021-1241-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include a code execution vulnerability.

View Article


Trojan.Win32.Bayrob.dtrg Insecure Permissions

Trojan.Win32.Bayrob.dtrg malware suffers from an insecure permissions vulnerability.

View Article

Red Hat Security Advisory 2021-1242-01

Red Hat Security Advisory 2021-1242-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include a code execution vulnerability.

View Article

Red Hat Security Advisory 2021-1239-01

Red Hat Security Advisory 2021-1239-01 - The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space.

View Article


WordPress Photo Gallery 1.5.69 Cross Site Scripting

WordPress Photo Gallery plugin versions 1.5.69 and below suffer from multiple reflective cross site scripting vulnerabilities.

View Article


Red Hat Security Advisory 2021-1240-01

Red Hat Security Advisory 2021-1240-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include a code execution vulnerability.

View Article

xscreensaver Raw Socket Leak

xscreensaver suffers from a raw socket leak vulnerability. Proof of concept exploit demonstrates running tcpdump via this issue.

View Article

Faraday 3.14.4

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the...

View Article

OpenSSH 8.6p1

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs...

View Article


Nagios XI 5.7.3 Remote Code Execution

This Metasploit module exploits CVE-2020-5791, an OS command injection vulnerability on Nagios XI versions 5.6.0 through 5.7.3 in admin/mibs.php that enables an authenticated user with admin privileges...

View Article

Trojan.Win32.Agent.hsm Insecure Permissions

Trojan.Win32.Agent.hsm malware suffers from an insecure permissions vulnerability.

View Article


Red Hat Security Advisory 2021-1245-01

Red Hat Security Advisory 2021-1245-01 - The gnutls packages provide the GNU Transport Layer Security library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Nettle...

View Article

Red Hat Security Advisory 2021-1246-01

Red Hat Security Advisory 2021-1246-01 - The gnutls packages provide the GNU Transport Layer Security library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Nettle...

View Article


Red Hat Security Advisory 2021-1258-01

Red Hat Security Advisory 2021-1258-01 - 389 Directory Server is an LDAP version 3 compliant server. The base packages include the Lightweight Directory Access Protocol server and command-line...

View Article

Plantronics HUB 3.21 Privilege Escalation

Plantronics HUB versions 3.21 and below are affected by a privilege escalation vulnerability allowing any local unprivileged user to acquire elevated access rights and take full control of the system.

View Article
Browsing all 19 articles
Browse latest View live




Latest Images