exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 29 RSS Feed

Files Date: 2019-01-31

Joomla Remository 3.58 Database Disclosure / Shell Upload / SQL Injection
Posted Jan 31, 2019
Authored by KingSkrupellos

Joomla Remository component version 3.58 suffers from database disclosure, remote shell upload, and remote SQL injection vulnerabilities.

tags | exploit, remote, shell, vulnerability, sql injection, info disclosure
SHA-256 | 0b8a3fd3fb2c96d845763215df15bf6230cd38540015adf11d9101520ce038cb
Joomla MorfeoShow 1.2.0 SQL Injection
Posted Jan 31, 2019
Authored by KingSkrupellos

Joomla MorfeoShow component version 1.2.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 6c8fbcb938603949f29764f9b348ddc8932b7238b0523c32a2b6486c41488787
Joomla JUserTube 8.3.1 SQL Injection
Posted Jan 31, 2019
Authored by KingSkrupellos

Joomla JUserTube component version 8.3.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d7908d85bb166d7c8aa0dbb477f6198b1109bb530796620271313fd791c6d325
Joomla JooMap 2.0.6 SQL Injection
Posted Jan 31, 2019
Authored by KingSkrupellos

Joomla JooMap component version 2.0.6 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | ba274efa3f2751546516e01b7f2036c1b2eaf3fcc7e39e969a16c74004600e06
Joomla JEvents 3.4.47 SQL Injection
Posted Jan 31, 2019
Authored by KingSkrupellos

Joomla JEvents component version 3.4.47 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 561875d1a0bf13d024259943e104c26eebb5c0c704e3f8a58ddabb1794863834
Joomla JComments 3.0.5 SQL Injection
Posted Jan 31, 2019
Authored by KingSkrupellos

Joomla JComments component version 3.0.5 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 31b34f759421df36315a242862bae605693e126d38a942133e42fbd2d48040dc
Joomla JCalPro Calendar 4.3.26 SQL Injection
Posted Jan 31, 2019
Authored by KingSkrupellos

Joomla JCalPro Calendar component version 4.3.26 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 1db22131b57e10d5fe99d1144b14ae0b34eb2ec2edf213ece9353bc5dd5f6169
Joomla HWDVideoShare 1.5 Bypass / Database Disclosure / SQL Injection
Posted Jan 31, 2019
Authored by KingSkrupellos

Joomla HWDVideoShare component version 1.5 suffers from bypass, database disclosure, and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, info disclosure
SHA-256 | 711ad2aa21514600ccdc335befa494e8199c5acbac1ff1ff9ab0b042fd72e346
Joomla HotelGuide 1.0 SQL Injection
Posted Jan 31, 2019
Authored by KingSkrupellos

Joomla HotelGuide component version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | fbf7ede2739e039115291db912cf37de0cf44c402bd866b2853fa1cda72dfd8a
Joomla Formularz 1.0.2 SQL Injection
Posted Jan 31, 2019
Authored by KingSkrupellos

Joomla Formularz component version 1.0.2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 1bd4f42de3c10d508f03204abb3916b04c526232993d397a3606c97ed20b5d23
WeBid 1.2.2 Cross Site Scripting
Posted Jan 31, 2019
Authored by Zekvan Arslan | Site netsparker.com

WeBid version 1.2.2 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 664795ab23255cbc8b85734dbf2e570c5d2010fe63665bf3278f21d340f67273
Ubuntu Security Notice USN-3876-2
Posted Jan 31, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3876-2 - USN-3876-1 fixed a vulnerability in Avahi. This update provides the corresponding update for Ubuntu 12.04 ESM. Chad Seaman discovered that Avahi incorrectly handled certain messages. An attacker could possibly use this issue to cause a denial of service. Various other issues were also addressed.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2017-6519
SHA-256 | 534ed3e8821dc2c6659ee366ead6ba94eac2668ade728ba640d133a073ca6ca5
Ubuntu Security Notice USN-3876-1
Posted Jan 31, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3876-1 - Chad Seaman discovered that Avahi incorrectly handled certain messages. An attacker could possibly use this issue to cause a denial of service.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2017-6519
SHA-256 | ecd33e9fdc0496684eebe6cc33ebb1d0db04916edfc7e746fe047c4f2255c5fc
Slackware Security Advisory - Slackware 14.2 kernel Updates
Posted Jan 31, 2019
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New kernel packages are available for Slackware 14.2 to fix security issues.

tags | advisory, kernel
systems | linux, slackware
advisories | CVE-2017-18241, CVE-2017-18249, CVE-2018-10880, CVE-2018-1120, CVE-2018-12896, CVE-2018-13053, CVE-2018-13096, CVE-2018-13097, CVE-2018-13099, CVE-2018-13100, CVE-2018-14610, CVE-2018-14611, CVE-2018-14612, CVE-2018-14613, CVE-2018-14614, CVE-2018-14616, CVE-2018-14633, CVE-2018-16862, CVE-2018-16884, CVE-2018-17972, CVE-2018-18021, CVE-2018-18281, CVE-2018-18690, CVE-2018-18710, CVE-2018-19824, CVE-2018-19985
SHA-256 | b00c9750a9d1a5293cf1b00be4962a74b7a8b39c5ae241b16f2e5d2e209b667b
Ubuntu Security Notice USN-3875-1
Posted Jan 31, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3875-1 - It was discovered that a memory disclosure issue existed in the OpenJDK Library subsystem. An attacker could use this to expose sensitive information and possibly bypass Java sandbox restrictions.

tags | advisory, java
systems | linux, ubuntu
advisories | CVE-2019-2422
SHA-256 | b8000d2283c05e4e0b377807f40d4d13096a58c131b3b0ae930ed8fee16f9d08
Ubuntu Security Notice USN-3874-1
Posted Jan 31, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3874-1 - Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, gain additional privileges by escaping the sandbox, or execute arbitrary code. It was discovered that Firefox allowed PAC files to specify that requests to localhost are sent through the proxy to another server. If proxy auto-detection is enabled, an attacker could potentially exploit this to conduct attacks on local services and tools. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, local
systems | linux, ubuntu
advisories | CVE-2018-18500, CVE-2018-18504, CVE-2018-18505, CVE-2018-18506
SHA-256 | 849e56e87e660f92ac3299e134feb4c3b7036ae3b970cdc33d069972baca43c4
UltraISO 9.7.1.3519 Local Buffer Overflow
Posted Jan 31, 2019
Authored by Dino Covotsos

UltraISO version 9.7.1.3519 local buffer overflow SEH exploit.

tags | exploit, overflow, local
SHA-256 | 6ab8a0be9621c72336bf3c3a52766bd10ac6041fa0b278ef35cb5cc1496ef4e2
AnyBurn x86 4.3 Denial Of Service
Posted Jan 31, 2019
Authored by Dino Covotsos

AnyBurn x86 version 4.3 suffers from a denial of service vulnerability.

tags | exploit, denial of service, x86
SHA-256 | f0b728371088f2c5e8db6b8d83c58786df87204d9660153e3bd8f547200264d1
R i386 3.5.0 Local Buffer Overflow
Posted Jan 31, 2019
Authored by Dino Covotsos

R i386 version 3.5.0 local buffer overflow SEH exploit.

tags | exploit, overflow, local
SHA-256 | a4af3b0cf6c770e0a4bffd814b8b4abd7a0fc4844ab958cf2b588386d96df166
Lynis Auditing Tool 2.7.1
Posted Jan 31, 2019
Authored by Michael Boelen | Site cisofy.com

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Changes: Added support for macOS Mojave and Slovak translation. Various other updates.
tags | tool, scanner
systems | unix
SHA-256 | f23dd57561f273a7e39e4597277571973dadbab6a131a4712340a6d0b36091f5
iOS / MacOS PF_KEY Kernel Heap Overflow
Posted Jan 31, 2019
Authored by Google Security Research, Ian Beer

iOS and MacOS suffer from a kernel heap overflow in PF_KEY due to lack of bounds checking when retrieving statistics.

tags | exploit, overflow, kernel
systems | ios
advisories | CVE-2019-6213
SHA-256 | bdaf091fad9a237fd95f4fa168b1b385cfb161f48fc179a6801b4e62a8099278
XNU vm_map_copy Optimization Issue
Posted Jan 31, 2019
Authored by Google Security Research, Ian Beer

XNU vm_map_copy optimization which requires atomicity is not atomic. This violates the semantics of mach message OOL memory, and leads to TOCTOU issues which can lead to memory corruption.

tags | exploit
advisories | CVE-2019-6205
SHA-256 | b373ad17106c25ccfb2435934691e9a515824d6d61c83d2a4930737e86b27e33
XNU copy-on-write Behavior Bypass
Posted Jan 31, 2019
Authored by Jann Horn, Google Security Research

XNU suffers from a copy-on-write behavior bypass via partial-page truncation of file.

tags | exploit
advisories | CVE-2019-6208
SHA-256 | ce2ac26d2111768bdd27f895202eac13116d1f30581d7892e8a671a7f8ac55db
iOS / MacOS iohideventsystem Sandbox Escape
Posted Jan 31, 2019
Authored by Google Security Research, Ian Beer

iOS and MacOS suffers from sandbox escape vulnerabilities due to type confusions and memory safety issues in iohideventsystem.

tags | exploit, vulnerability
systems | ios
advisories | CVE-2019-6214
SHA-256 | b146623feeb4a1369ee8ad78d27a529480b21c17737e192ad3c2686b0448d8cb
MacOS 10.14.1 libxpc Deallocation
Posted Jan 31, 2019
Authored by Google Security Research, Ian Beer

libxpc on MacOS version 10.14.1 suffers from an arbitrary mach port name deallocation in XPC services due to invalid mach message parsing in _xpc_serializer_unpack.

tags | exploit, arbitrary
advisories | CVE-2019-6218
SHA-256 | 861787c4c8e28e6258f60f01561930d07585075db06c25a1f80b7aadb5eeb770
Page 1 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close