exploit the possibilities

Recent Files

Files RSS Feed
Debian Security Advisory 4502-1
Posted Aug 17, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4502-1 - Several vulnerabilities have been discovered in the FFmpeg multimedia framework, which could result in denial of service or potentially the execution of arbitrary code if malformed files/streams are processed.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, debian
Open-Xchange OX App Suite Content Spoofing / Cross Site Scripting
Posted Aug 16, 2019
Authored by Martin Heiland, zee_shan

Open-Xchange OX App Suite suffers from a content spoofing, cross site scripting, and information disclosure vulnerabilities. Versions affected vary depending on the vulnerability.

tags | exploit, spoof, vulnerability, xss, info disclosure
Open-Xchange OX Guard Cross Site Scripting / Signature Validation
Posted Aug 16, 2019
Authored by Hanno Boeck, Juraj Somorovsky, Martin Heiland, Jorg Schwenk, Sebastian Schinzel, Damian Poddebniak, Jens Muller, Marcus Brinkmann

Open-Xchange OX Guard versions 7.10.2 and below suffer from a cross site scripting vulnerability. Open-Xchange OX Guard versions 7.10.1 and below, 2.10.2 and below suffer from a signature validation vulnerability.

tags | exploit, xss
Ubuntu Security Notice USN-4101-1
Posted Aug 16, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4101-1 - It was discovered that passwords could be copied to the clipboard from the "Saved Logins" dialog without entering the master password, even when a master password has been set. A local attacker could potentially exploit this to obtain saved passwords.

tags | advisory, local
systems | linux, ubuntu
Gentoo Linux Security Advisory 201908-20
Posted Aug 16, 2019
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201908-20 - Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code. Versions less than 60.8.0 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
GNU patch Command Injection / Directory Traversal
Posted Aug 16, 2019
Authored by Imre Rad

GNU patch suffers from command injection and various other vulnerabilities when handling specially crafted patch files.

tags | exploit, vulnerability
Debian Security Advisory 4501-1
Posted Aug 16, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4501-1 - It was discovered that the code fixes to address CVE-2018-16858 and CVE-2019-9848 were not complete.

tags | advisory
systems | linux, debian
GetGo Download Manager 6.2.2.3300 Denial Of Service
Posted Aug 16, 2019
Authored by Malav Vyas, Velayuthm Selvaraj

GetGo Download Manager version 6.2.2.3300 suffers from a denial of service vulnerability.

tags | exploit, denial of service
Joomla JS Jobs 1.2.6 Arbitrary File Delete
Posted Aug 16, 2019
Authored by qw3rTyTy

Joomla JS Jobs component version 1.2.6 suffers from an arbitrary file deletion vulnerability.

tags | exploit, arbitrary
Web Wiz Forums 12.01 SQL Injection
Posted Aug 16, 2019
Authored by n1x_

Web Wiz Forums version 12.01 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
Integria IMS 5.0.86 Arbitrary File Upload
Posted Aug 16, 2019
Authored by Greg Priest

Integria IMS version 5.0.86 suffers from an arbitrary file upload vulnerability that allows for remote command execution.

tags | exploit, remote, arbitrary, file upload
EyesOfNetwork 5.1 Remote Command Execution
Posted Aug 16, 2019
Authored by Nassim Asrir

EyesOfNetwork version 5.1 authenticated remote command execution exploit.

tags | exploit, remote
Ubuntu Security Notice USN-4099-1
Posted Aug 15, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4099-1 - Jonathan Looney discovered that nginx incorrectly handled the HTTP/2 implementation. A remote attacker could possibly use this issue to consume resources, leading to a denial of service.

tags | advisory, remote, web, denial of service
systems | linux, ubuntu
Gentoo Linux Security Advisory 201908-19
Posted Aug 15, 2019
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201908-19 - A vulnerability in GNU Wget might allow an attacker to execute arbitrary code. Versions less than 1.20.3 are affected.

tags | advisory, arbitrary
systems | linux, gentoo
Adobe Acrobat Reader DC For Windows JP2 Stream Double-Free
Posted Aug 15, 2019
Authored by Google Security Research, mjurczyk

Adobe Acrobat Reader DC for Windows suffers from a double-free vulnerability due to a malformed JP2 stream.

tags | exploit
systems | windows
Red Hat Security Advisory 2019-2512-01
Posted Aug 15, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-2512-01 - Subversion is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Issues addressed include denial of service and null pointer vulnerabilities.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
Adobe Acrobat Reader DC For Windows Uninitialized Pointer free()
Posted Aug 15, 2019
Authored by Google Security Research, mjurczyk

Adobe Acrobat Reader DC for Windows could trigger a free() of an uninitialized pointer due to malformed JBIG2Globals streams.

tags | exploit
systems | windows
Adobe Acrobat Reader DC For Windows JP2 Stream Buffer Overflow
Posted Aug 15, 2019
Authored by Google Security Research, mjurczyk

Adobe Acrobat Reader DC for Windows suffers from a heap-based buffer overflow vulnerability due to a malformed JP2 stream.

tags | exploit, overflow
systems | windows
Gentoo Linux Security Advisory 201908-18
Posted Aug 15, 2019
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201908-18 - Multiple vulnerabilities have been found in Chromium and Google Chrome, the worst of which could allow remote attackers to execute arbitrary code. Versions less than 76.0.3809.100 are affected.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, gentoo
Red Hat Security Advisory 2019-2508-01
Posted Aug 15, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-2508-01 - Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow
systems | linux, redhat
Adobe Acrobat Reader DC For Windows Malformed TTF Font Memory Corruption
Posted Aug 15, 2019
Authored by Google Security Research, mjurczyk

Adobe Acrobat Reader DC for Windows suffers from a heap-based memory corruption vulnerability due to a malformed TTF font.

tags | exploit
systems | windows
Adobe Acrobat Reader DC For Windows CoolType.dll Buffer Overflow
Posted Aug 15, 2019
Authored by Google Security Research, mjurczyk

Adobe Acrobat Reader DC for Windows suffers from a heap-based buffer overflow vulnerability in CoolType.dll.

tags | exploit, overflow
systems | windows
Adobe Acrobat Reader DC For Windows Malformed Font Stream Buffer Overflow
Posted Aug 15, 2019
Authored by Google Security Research, mjurczyk

Adobe Acrobat Reader DC for Windows suffers from a heap-based buffer overflow vulnerability due to a malformed font stream.

tags | exploit, overflow
systems | windows
Adobe Acrobat Reader DC For Windows Malformed Font Stream Buffer Overflow
Posted Aug 15, 2019
Authored by Google Security Research, mjurczyk

Adobe Acrobat Reader DC for Windows suffers from a static buffer overflow vulnerability due to a malformed font stream.

tags | exploit, overflow
systems | windows
Gentoo Linux Security Advisory 201908-17
Posted Aug 15, 2019
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201908-17 - A vulnerability in ZeroMQ might allow an attacker to execute arbitrary code. Versions less than 4.3.2 are affected.

tags | advisory, arbitrary
systems | linux, gentoo
View Older Files →

Recent News

News RSS Feed
We Asked Def Con Attendees Why People Are Still Getting Hacked
Posted Aug 16, 2019

tags | headline, hacker, conference
Judge Orders Georgia To Switch To Paper Ballots For 2020 Elections
Posted Aug 16, 2019

tags | headline, government, usa, fraud
Huawei Africa Spying Claims Denied
Posted Aug 16, 2019

tags | headline, government, china, africa, spyware, facebook
Trump Admin Wants To Extend NSA Phone Surveillance Program
Posted Aug 16, 2019

tags | headline, government, privacy, usa, phone, spyware, nsa
Amazon's Rekognition Software Can Now Spot Fear
Posted Aug 15, 2019

tags | headline, amazon, science
Biostar Security Software Leaked A Million Fingerprints
Posted Aug 15, 2019

tags | headline, data loss, password
Trend Micro Fixes Privilege Escalation Flaw In Password Manager
Posted Aug 15, 2019

tags | headline, flaw, password, patch
700,000 Choice Hotels Records Leaked In Data Breach, Ransom Demanded
Posted Aug 15, 2019

tags | headline, privacy, database, data loss
Facebook Latest To Admit Their Contractors Snoop On Your Conversations
Posted Aug 14, 2019

tags | headline, privacy, facebook, social
Adobe Security Patch Update Covers Quite A Bit
Posted Aug 14, 2019

tags | headline, flaw, adobe, patch
View More News →

File Archive:

August 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    10 Files
  • 2
    Aug 2nd
    8 Files
  • 3
    Aug 3rd
    2 Files
  • 4
    Aug 4th
    1 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    79 Files
  • 7
    Aug 7th
    16 Files
  • 8
    Aug 8th
    10 Files
  • 9
    Aug 9th
    10 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    6 Files
  • 12
    Aug 12th
    26 Files
  • 13
    Aug 13th
    15 Files
  • 14
    Aug 14th
    19 Files
  • 15
    Aug 15th
    52 Files
  • 16
    Aug 16th
    11 Files
  • 17
    Aug 17th
    1 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

News Tags

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close