172.86.107.111.sslip.io
Open in
urlscan Pro
172.86.107.111
Public Scan
URL:
https://172.86.107.111.sslip.io/
Submission: On August 08 via api from US — Scanned from DE
Submission: On August 08 via api from US — Scanned from DE
Form analysis
2 forms found in the DOMGET /search/
<form method="get" action="/search/"><input type="text" name="q" id="q" maxlength="120" value="Search …"><button type="submit"></button>
<div id="q-tabs"><label for="s-files" class="on">Files</label><label for="s-news">News</label><label for="s-users">Users</label><label for="s-authors">Authors</label><input type="radio" value="files" name="s" id="s-files"><input type="radio"
value="news" name="s" id="s-news"><input type="radio" value="users" name="s" id="s-users"><input type="radio" value="authors" name="s" id="s-authors"></div>
</form>
GET /files/cal/
<form id="cal" action="/files/cal/" method="get">
<h2>File Archive:</h2>
<h3>August 2024</h3>
<button id="cal-prev" name="cal-prev" type="button" value="2024-8"><span><</span></button>
<ul class="dotw">
<li>Su</li>
<li>Mo</li>
<li>Tu</li>
<li>We</li>
<li>Th</li>
<li>Fr</li>
<li>Sa</li>
</ul>
<ul>
<li></li>
<li></li>
<li></li>
<li></li>
<li class="med"><a href="/files/date/2024-08-01/">1</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 1st</div>
<div class="count">15 Files</div>
</div>
</li>
<li class="med"><a href="/files/date/2024-08-02/">2</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 2nd</div>
<div class="count">22 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-03/">3</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 3rd</div>
<div class="count">0 Files</div>
</div>
</li>
</ul>
<ul>
<li class="none"><a href="/files/date/2024-08-04/">4</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 4th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="med"><a href="/files/date/2024-08-05/">5</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 5th</div>
<div class="count">15 Files</div>
</div>
</li>
<li class="low"><a href="/files/date/2024-08-06/">6</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 6th</div>
<div class="count">11 Files</div>
</div>
</li>
<li class="med"><a href="/files/date/2024-08-07/">7</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 7th</div>
<div class="count">43 Files</div>
</div>
</li>
<li class="none today"><a href="/files/date/2024-08-08/">8</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 8th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-09/">9</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 9th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-10/">10</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 10th</div>
<div class="count">0 Files</div>
</div>
</li>
</ul>
<ul>
<li class="none"><a href="/files/date/2024-08-11/">11</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 11th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-12/">12</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 12th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-13/">13</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 13th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-14/">14</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 14th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-15/">15</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 15th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-16/">16</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 16th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-17/">17</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 17th</div>
<div class="count">0 Files</div>
</div>
</li>
</ul>
<ul>
<li class="none"><a href="/files/date/2024-08-18/">18</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 18th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-19/">19</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 19th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-20/">20</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 20th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-21/">21</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 21st</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-22/">22</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 22nd</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-23/">23</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 23rd</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-24/">24</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 24th</div>
<div class="count">0 Files</div>
</div>
</li>
</ul>
<ul>
<li class="none"><a href="/files/date/2024-08-25/">25</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 25th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-26/">26</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 26th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-27/">27</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 27th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-28/">28</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 28th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-29/">29</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 29th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-30/">30</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 30th</div>
<div class="count">0 Files</div>
</div>
</li>
<li class="none"><a href="/files/date/2024-08-31/">31</a>
<div class="stats">
<div class="point"></div>
<div class="date">Aug 31st</div>
<div class="count">0 Files</div>
</div>
</li>
</ul>
</form>
Text Content
what you don't know can hurt you Register | Login FilesNewsUsersAuthors Home Files News &[SERVICES_TAB]About Contact Add New Inherent Disadvantage: Why Hackers Have The Upper Hand In The Cloud Police Recover $40 Million Stolen In Business Email Scam Google Patches 46 Android Bugs, Including Exploited Kernel Flaw Ransomware Attack Cost LoanDepot $27 Million RECENT FILES * All * Exploits * Advisories * Tools * Whitepapers * Other Gentoo Linux Security Advisory 202408-13 Posted Aug 7, 2024 Authored by Gentoo | Site security.gentoo.org Gentoo Linux Security Advisory 202408-13 - A vulnerability has been discovered in Nokogiri, which can lead to a denial of service. Versions greater than or equal to 1.13.10 are affected. tags | advisory, denial of service systems | linux, gentoo Download | Favorite | View Debian Security Advisory 5740-1 Posted Aug 7, 2024 Authored by Debian | Site debian.org Debian Linux Security Advisory 5740-1 - Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code, the bypass of sandbox restrictions or an information leak. tags | advisory, web, arbitrary systems | linux, debian Download | Favorite | View Mailcow TFA Authentication Bypass Posted Aug 7, 2024 Authored by Patrik Mayor | Site github.com This is a proof of concept exploit to bypass two factor authentication in Mailcow versions prior to 2024-07. tags | exploit, proof of concept Download | Favorite | View Firebeam CVE-2024-26229 Plugin Posted Aug 7, 2024 Authored by Cracked5pider | Site github.com A small firebeam (kaine's risc-v vm) plugin to exploit the CVE-2024-26229 vulnerability that utilizes a vulnerable IOCTL in csc.sys. The vulnerability is used to get kernel R/W memory access to corrupt the KTHREAD->PreviousMode and then to leveraging DKOM to achieve LPE by copying over the token from the system process over to the current process token. tags | exploit, kernel, risc Download | Favorite | View WordPress PayPlus Payment Gateway SQL Injection Posted Aug 7, 2024 Authored by j3r1ch0123 | Site github.com WordPress PayPlus Payment Gateway plugin versions prior to 6.6.9 suffer from a remote SQL injection vulnerability. tags | exploit, remote, sql injection Download | Favorite | View Gentoo Linux Security Advisory 202408-12 Posted Aug 7, 2024 Authored by Gentoo | Site security.gentoo.org Gentoo Linux Security Advisory 202408-12 - A vulnerability has been discovered in Bitcoin, which can lead to a denial of service. Versions greater than or equal to 25.0 are affected. tags | advisory, denial of service systems | linux, gentoo Download | Favorite | View Debian Security Advisory 5739-1 Posted Aug 7, 2024 Authored by Debian | Site debian.org Debian Linux Security Advisory 5739-1 - user able to escalate to the netdev group can load arbitrary shared object files in the context of the wpa_supplicant process running as root. tags | advisory, arbitrary, root systems | linux, debian Download | Favorite | View Ubuntu Security Notice USN-6945-1 Posted Aug 7, 2024 Authored by Ubuntu | Site security.ubuntu.com Ubuntu Security Notice 6945-1 - Rory McNamara discovered that wpa_supplicant could be made to load arbitrary shared objects by unprivileged users that have access to the control interface. An attacker could use this to escalate privileges to root. tags | advisory, arbitrary, root systems | linux, ubuntu Download | Favorite | View Gentoo Linux Security Advisory 202408-11 Posted Aug 7, 2024 Authored by Gentoo | Site security.gentoo.org Gentoo Linux Security Advisory 202408-11 - Multiple vulnerabilities have been discovered in aiohttp, the worst of which could lead to service compromise. Versions greater than or equal to 3.9.4 are affected. tags | advisory, vulnerability systems | linux, gentoo Download | Favorite | View Gentoo Linux Security Advisory 202408-10 Posted Aug 7, 2024 Authored by Gentoo | Site security.gentoo.org Gentoo Linux Security Advisory 202408-10 - Multiple vulnerabilities have been discovered in nghttp2, the worst of which could lead to a denial of service. Versions greater than or equal to 1.61.0 are affected. tags | advisory, denial of service, vulnerability systems | linux, gentoo Download | Favorite | View Gentoo Linux Security Advisory 202408-09 Posted Aug 7, 2024 Authored by Gentoo | Site security.gentoo.org Gentoo Linux Security Advisory 202408-9 - Multiple vulnerabilities have been discovered in Cairo, the worst of which a denial of service. Versions greater than or equal to 1.18.0 are affected. tags | advisory, denial of service, vulnerability systems | linux, gentoo Download | Favorite | View Red Hat Security Advisory 2024-5067-03 Posted Aug 7, 2024 Authored by Red Hat | Site access.redhat.com Red Hat Security Advisory 2024-5067-03 - An update for kernel-rt is now available for Red Hat Enterprise Linux 9.2 Extended Update Support. Issues addressed include double free and null pointer vulnerabilities. tags | advisory, kernel, vulnerability systems | linux, redhat Download | Favorite | View Red Hat Security Advisory 2024-5065-03 Posted Aug 7, 2024 Authored by Red Hat | Site access.redhat.com Red Hat Security Advisory 2024-5065-03 - An update for kernel is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service. tags | advisory, kernel systems | linux, redhat Download | Favorite | View Gentoo Linux Security Advisory 202408-08 Posted Aug 7, 2024 Authored by Gentoo | Site security.gentoo.org Gentoo Linux Security Advisory 202408-8 - A vulnerability has been discovered in json-c, which can lead to a stack buffer overflow. Versions greater than or equal to 0.16 are affected. tags | advisory, overflow systems | linux, gentoo Download | Favorite | View Gentoo Linux Security Advisory 202408-07 Posted Aug 7, 2024 Authored by Gentoo | Site security.gentoo.org Gentoo Linux Security Advisory 202408-7 - Multiple vulnerabilities have been discovered in Go, the worst of which could lead to information leakage or a denial of service. Versions greater than or equal to 1.22.3 are affected. tags | advisory, denial of service, vulnerability systems | linux, gentoo Download | Favorite | View Red Hat Security Advisory 2024-5056-03 Posted Aug 7, 2024 Authored by Red Hat | Site access.redhat.com Red Hat Security Advisory 2024-5056-03 - Red Hat Integration Camel K 1.10.7 release and security update is now available. tags | advisory systems | linux, redhat Download | Favorite | View Red Hat Security Advisory 2024-5054-03 Posted Aug 7, 2024 Authored by Red Hat | Site access.redhat.com Red Hat Security Advisory 2024-5054-03 - Red Hat OpenShift Virtualization release 4.16.1 is now available with updates to packages and images that fix several bugs and add enhancements. tags | advisory systems | linux, redhat Download | Favorite | View Red Hat Security Advisory 2024-5041-03 Posted Aug 7, 2024 Authored by Red Hat | Site access.redhat.com Red Hat Security Advisory 2024-5041-03 - An update for python-urllib3 is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service. tags | advisory, python systems | linux, redhat Download | Favorite | View Red Hat Security Advisory 2024-5040-03 Posted Aug 7, 2024 Authored by Red Hat | Site access.redhat.com Red Hat Security Advisory 2024-5040-03 - An update for python-setuptools is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service. Issues addressed include a code execution vulnerability. tags | advisory, code execution, python systems | linux, redhat Download | Favorite | View Red Hat Security Advisory 2024-5025-03 Posted Aug 7, 2024 Authored by Red Hat | Site access.redhat.com Red Hat Security Advisory 2024-5025-03 - Red Hat JBoss Web Server 5.8.1 zip release is now available for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 9, and Windows Server. tags | advisory, web systems | linux, redhat, windows Download | Favorite | View Gentoo Linux Security Advisory 202408-05 Posted Aug 7, 2024 Authored by Gentoo | Site security.gentoo.org Gentoo Linux Security Advisory 202408-5 - Multiple vulnerabilities have been discovered in Redis, the worst of which may lead to a denial of service or possible remote code execution. Versions greater than or equal to 7.2.4 are affected. tags | advisory, remote, denial of service, vulnerability, code execution systems | linux, gentoo Download | Favorite | View E-Commerce Site Using PHP PDO 1.0 Directory Traversal Posted Aug 7, 2024 Authored by indoushka E-Commerce Site using PHP PDO version 1.0 suffers from a directory traversal vulnerability. tags | exploit, php, file inclusion Download | Favorite | View Covid-19 Directory On Vaccination System 1.0 Insecure Settings Posted Aug 7, 2024 Authored by indoushka Covid-19 Directory on Vaccination System version 1.0 suffers from an ignored default credential vulnerability. tags | exploit Download | Favorite | View Red Hat Security Advisory 2024-5024-03 Posted Aug 7, 2024 Authored by Red Hat | Site access.redhat.com Red Hat Security Advisory 2024-5024-03 - An update is now available for Red Hat JBoss Web Server 5.8 on Red Hat Enterprise Linux versions 7, 8, and 9. tags | advisory, web systems | linux, redhat Download | Favorite | View Red Hat Security Advisory 2024-5002-03 Posted Aug 7, 2024 Authored by Red Hat | Site access.redhat.com Red Hat Security Advisory 2024-5002-03 - An update for python3.11-setuptools is now available for Red Hat Enterprise Linux 8.8 Extended Update Support. Issues addressed include a code execution vulnerability. tags | advisory, code execution systems | linux, redhat Download | Favorite | View View Older Files → * Follow us on Twitter * Follow us on Facebook * Subscribe to an RSS Feed RECENT NEWS CrowdStrike Releases Root Cause Analysis Of BSOD Crash Posted Aug 7, 2024 tags | headline, denial of service, flaw Favorite | View CSS Tweaks Help Emails Slip Through Outlook's Anti-Phishing Net Posted Aug 7, 2024 tags | headline, microsoft, email, flaw, phish Favorite | View CrowdStrike And Delta Play The Blame Game Posted Aug 6, 2024 tags | headline, denial of service, flaw Favorite | View Thousands Of Devices Wiped Remotely Following Mobile Guardian Hack Posted Aug 6, 2024 tags | headline, hacker, phone, data loss Favorite | View Proton Ransomware Evolves With Latest Zola Variant Posted Aug 6, 2024 tags | headline, malware, cybercrime, cryptography Favorite | View NFL To Begin Using Face Scanning Tech Across All Of Its Stadiums Posted Aug 6, 2024 tags | headline, privacy, spyware Favorite | View Billion Dollar Bust As Op Shutters Cryptonator Wallet Posted Aug 6, 2024 tags | headline, government, usa, cybercrime, fraud, cryptography Favorite | View New SLUBStick Attack Makes Linux Kernel Vulnerabilities More Dangerous Posted Aug 5, 2024 tags | headline, hacker, malware, linux Favorite | View Chinese Hackers Deliver Malware Via ISP-Level DNS Poisoning Posted Aug 5, 2024 tags | headline, hacker, malware, dns, china, cyberwar Favorite | View Ukraine Steps Up Cyberwar With DDoS On Russian Banks Posted Aug 5, 2024 tags | headline, government, bank, russia, denial of service, cyberwar, military, ukraine Favorite | View View More News → FILE ARCHIVE: AUGUST 2024 < * Su * Mo * Tu * We * Th * Fr * Sa * * * * * 1 Aug 1st 15 Files * 2 Aug 2nd 22 Files * 3 Aug 3rd 0 Files * 4 Aug 4th 0 Files * 5 Aug 5th 15 Files * 6 Aug 6th 11 Files * 7 Aug 7th 43 Files * 8 Aug 8th 0 Files * 9 Aug 9th 0 Files * 10 Aug 10th 0 Files * 11 Aug 11th 0 Files * 12 Aug 12th 0 Files * 13 Aug 13th 0 Files * 14 Aug 14th 0 Files * 15 Aug 15th 0 Files * 16 Aug 16th 0 Files * 17 Aug 17th 0 Files * 18 Aug 18th 0 Files * 19 Aug 19th 0 Files * 20 Aug 20th 0 Files * 21 Aug 21st 0 Files * 22 Aug 22nd 0 Files * 23 Aug 23rd 0 Files * 24 Aug 24th 0 Files * 25 Aug 25th 0 Files * 26 Aug 26th 0 Files * 27 Aug 27th 0 Files * 28 Aug 28th 0 Files * 29 Aug 29th 0 Files * 30 Aug 30th 0 Files * 31 Aug 31st 0 Files TOP AUTHORS IN LAST 30 DAYS * Red Hat 260 files * Ubuntu 90 files * indoushka 64 files * Jasper Nota 25 files * Gentoo 19 files * Willem Westerhof 19 files * Debian 15 files * Jim Blankendaal 11 files * Martijn Baalman 9 files * Apple 9 files FILE TAGS * ActiveX (933) * Advisory (86,289) * Arbitrary (16,852) * BBS (2,859) * Bypass (1,860) * CGI (1,033) * Code Execution (7,792) * Conference (691) * Cracker (844) * CSRF (3,386) * DoS (25,050) * Encryption (2,389) * Exploit (53,137) * File Inclusion (4,259) * File Upload (990) * Firewall (822) * Info Disclosure (2,889) * Intrusion Detection (915) * Java (3,143) * JavaScript (896) * Kernel (7,191) * Local (14,791) * Magazine (586) * Overflow (13,167) * Perl (1,435) * PHP (5,222) * Proof of Concept (2,382) * Protocol (3,724) * Python (1,635) * Remote (31,646) * Root (3,635) * Rootkit (526) * Ruby (631) * Scanner (1,657) * Security Tool (8,025) * Shell (3,273) * Shellcode (1,217) * Sniffer (902) * Spoof (2,275) * SQL Injection (16,605) * TCP (2,440) * Trojan (690) * UDP (904) * Virus (669) * Vulnerability (32,941) * Web (9,960) * Whitepaper (3,782) * x86 (967) * XSS (18,246) * Other FILE ARCHIVES * August 2024 * July 2024 * June 2024 * May 2024 * April 2024 * March 2024 * February 2024 * January 2024 * December 2023 * November 2023 * October 2023 * September 2023 * Older SYSTEMS * AIX (429) * Apple (2,099) * BSD (377) * CentOS (58) * Cisco (1,927) * Debian (7,090) * Fedora (1,693) * FreeBSD (1,246) * Gentoo (4,547) * HPUX (880) * iOS (378) * iPhone (108) * IRIX (220) * Juniper (69) * Linux (50,646) * Mac OS X (691) * Mandriva (3,105) * NetBSD (256) * OpenBSD (489) * RedHat (16,459) * Slackware (941) * Solaris (1,611) * SUSE (1,444) * Ubuntu (9,729) * UNIX (9,433) * UnixWare (187) * Windows (6,670) * Other NEWS TAGS * 0 Day (299) * Adobe (310) * Anonymous (350) * Apple (1,063) * Backdoor (702) * Bank (1,207) * Botnet (579) * Britain (1,106) * China (940) * Cisco (208) * Conference (322) * Cryptography (1,601) * Cybercrime (2,106) * Cyberwar (1,921) * Data Loss (3,939) * Database (227) * DoS (547) * Email (517) * Facebook (829) * FBI (455) * Flaw (4,493) * Fraud (2,663) * Google (1,559) * Government (6,956) * Hacker (7,532) * Headline (19,760) * Identity Theft (211) * Iran (220) * Linux (260) * Malware (2,724) * Microsoft (1,820) * Military (219) * Mozilla (215) * NSA (678) * Password (775) * Patch (1,003) * Phish (373) * Phone (1,925) * Privacy (4,757) * Russia (1,061) * Scada (205) * Scam (273) * Science (534) * Social (467) * Space (256) * Spam (379) * Spyware (1,593) * Terror (402) * Trojan (321) * Twitter (402) * USA (3,880) * Virus (397) * Wireless (227) * Worm (201) * Other NEWS ARCHIVES * August 2024 * July 2024 * June 2024 * May 2024 * April 2024 * March 2024 * February 2024 * January 2024 * December 2023 * November 2023 * October 2023 * September 2023 * Older © 2022 Packet Storm. All rights reserved. Site Links News by Month News Tags Files by Month File Tags File Directory About Us History & Purpose Contact Information Terms of Service Privacy Statement Copyright Information Services Security Services Hosting By Rokasec * Follow us on Twitter * Follow us on Facebook * Subscribe to an RSS Feed