exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 24 of 24 RSS Feed

Files Date: 2019-02-28

Joomla J2Store SQL Injection
Posted Feb 28, 2019
Authored by Andrei Conache

Joomla J2Store versions prior to 3.3.7 suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2019-9184
SHA-256 | 1e97794d4336f176dd444cd3487fac8800756e95c4fa44ecb5dbc4a997e2daa4
Cisco WebEx Meetings Privilege Escalation
Posted Feb 28, 2019
Authored by Core Security Technologies, Marcos Accossatto | Site coresecurity.com

A vulnerability in the update service of Cisco Webex Meetings Desktop App for Windows could allow a local attacker to elevate privileges. Cisco Webex Meetings Desktop App versions 33.6.4.15, 33.6.5.2, 33.7.0.694, 33.7.1.15, 33.7.2.24, 33.7.3.7, 33.8.0.779, 33.8.1.13, and 33.8.2.7 are affected.

tags | exploit, local
systems | cisco, windows
advisories | CVE-2019-1674
SHA-256 | 9d1274a1cd79b05c5388dac3dae49ae0bd47e790ca5b08b896914d7cc2998ca8
Asterisk Project Security Advisory - AST-2019-001
Posted Feb 28, 2019
Authored by Sotiris Ganouris | Site asterisk.org

Asterisk Project Security Advisory - When Asterisk makes an outgoing call, a very specific SDP protocol violation by the remote party can cause Asterisk to crash.

tags | advisory, remote, protocol
advisories | CVE-2019-7251
SHA-256 | cfd552c580ab39cd59a7ced3f4275e11227e78524785c98e12870dd229702f7a
Ubuntu Security Notice USN-3900-1
Posted Feb 28, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3900-1 - It was discovered that GD incorrectly handled memory when processing certain images. A remote attacker could use this issue with a specially crafted image file to cause GD to crash, resulting in a denial of service, or possibly execute arbitrary code.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2019-6977
SHA-256 | 46470680db6dfc7a7bf912eb15368330de552c69127de9ce9ce73617c85925f1
Red Hat Security Advisory 2019-0436-01
Posted Feb 28, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0436-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Issues addressed include a memory disclosure vulnerability.

tags | advisory, java
systems | linux, redhat
advisories | CVE-2019-2422
SHA-256 | 3d13b627f0f2833454eaf6f13086748c3c9a3877f4f94f04f8d99ecfe0210f5f
Red Hat Security Advisory 2019-0435-01
Posted Feb 28, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0435-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Issues addressed include a memory disclosure vulnerability.

tags | advisory, java
systems | linux, redhat
advisories | CVE-2019-2422
SHA-256 | 3d6158b003a3ef9b9c2b26b7622e9caa36763a0711f35e910235066370e3f0ab
Red Hat Security Advisory 2019-0431-01
Posted Feb 28, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0431-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. Issues addressed include a traversal vulnerability.

tags | advisory, remote
systems | linux, redhat
advisories | CVE-2019-3828
SHA-256 | 8f36e85cc59e193fe75cdbbe302b121b8a7d63456b829ae5ccbbc18d0bd92760
Red Hat Security Advisory 2019-0430-01
Posted Feb 28, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0430-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. Issues addressed include a traversal vulnerability.

tags | advisory, remote
systems | linux, redhat
advisories | CVE-2019-3828
SHA-256 | 115db480d8acd284058dbc2b9f8f19d72753b76ee95bb06cf2139b85a0d858a1
Red Hat Security Advisory 2019-0432-01
Posted Feb 28, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0432-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. Issues addressed include a traversal vulnerability.

tags | advisory, remote
systems | linux, redhat
advisories | CVE-2019-3828
SHA-256 | 25d262d0929ed26f3c9a8d083b219a9f9378a368566644c5f0b2ada87269adf7
Red Hat Security Advisory 2019-0433-01
Posted Feb 28, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0433-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. Issues addressed include a traversal vulnerability.

tags | advisory, remote
systems | linux, redhat
advisories | CVE-2019-3828
SHA-256 | f7e671e88c0039e80d7e4df094f3c1a998198cecc67f85642280355229761570
Wireshark Analyzer 3.0.0
Posted Feb 28, 2019
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

Changes: Many user interface improvements have been made. Data following a TCP ZeroWindowProbe is marked as retransmission and not passed to subdissectors. Various other updates.
tags | tool, sniffer, protocol
systems | windows, unix
SHA-256 | bc4f30f5b2e94f3a696fef9de44673cdf402db90aac5299966da647f708f009e
Joomla Content 3.x SQL Injection
Posted Feb 28, 2019
Authored by KingSkrupellos

Joomla Content component version 3.x suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 9ba6843822eb295a8cb3e2cf6821ce870f61f2cee34eb1132a8cc436ea24c19f
Debian Security Advisory 4395-2
Posted Feb 28, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4395-2 - A regression was introduced in the previous chromium security update. The browser would always crash when launched in headless mode. This update fixes this problem.

tags | advisory
systems | linux, debian
SHA-256 | 89f054e653264588cb6a20adbe30c78ecdea038c752f2d8723fb77bbc234fc59
Android Securty Research: Crypto Local Storage Attack
Posted Feb 28, 2019
Authored by Viet Nguyen Quoc, Loc Phan Van

Whitepaper called Android Security Research: Crypto Wallet Local Storage Attack.

tags | paper, local, cryptography
SHA-256 | d4ec44d04cda2c87a67db49c174fec961eb574fcddcdec97e38b0cdd8f2c2a23
FTP Server 1.32 Denial Of Service
Posted Feb 28, 2019
Authored by Marcelo Vazquez

FTP Server version 1.32 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 300bae6c8767ddf928747116088b6a4834029d98aa60ccacc139e083987e83ce
Feng Office 3.7.0.5 Remote Command Execution
Posted Feb 28, 2019
Authored by Ozkan Mustafa Akkus | Site metasploit.com

This Metasploit module exploits an arbitrary file upload vulnerability in Feng Office version 3.7.0.5. The application allows unauthenticated users to upload arbitrary files. There is no control of any session. All files are sent under /tmp directory. The .htaccess file under the /tmp directory prevents files with the php, php2, and php3 extensions. This exploit creates the php payload and moves the payload to the main directory via shtml. After moving the php payload to the main directory, the exploit executes payload and receives a shell.

tags | exploit, arbitrary, shell, php, file upload
SHA-256 | a940da2e6fa296310cce651b821c9fdf8c7a9ec1bb8147e392837045d45532aa
WordPress Cerber 8.0 Bypass
Posted Feb 28, 2019
Authored by ed0x21son

WordPress Cerber Security, Antispam, and Malware Scan plugin version 8.0 suffers from multiple bypass vulnerabilities.

tags | exploit, vulnerability, bypass
SHA-256 | 4a5265fe88f590f2244214ce3ceaa7a2cff1c4aa959fe7a44a983ec7873765df
vBulletin 4.2.5 vBSEO 3.6.1 Open Redirection
Posted Feb 28, 2019
Authored by KingSkrupellos

vBulletin version 4.2.5 with vBSEO version 3.6.1 suffers from an open redirection vulnerability.

tags | exploit
SHA-256 | 3e6072c777f9e6b1fa54d538e3787db1c5549291bfde83d4d7294b5f5158b225
vBulletin 4.x.x DragonByte SEO 2.0.31 Open Redirection
Posted Feb 28, 2019
Authored by KingSkrupellos

vBulletin version 4.x.x with DragonByte SEO version 2.0.31 suffers from an open redirection vulnerability.

tags | exploit
SHA-256 | c30a29020b2699d4b2fca2b1786f0511f9e9546a4d8d9a6313fa1002191ef024
Usermin 1.750 Remote Command Execution
Posted Feb 28, 2019
Authored by Ozkan Mustafa Akkus | Site metasploit.com

This Metasploit module exploits an arbitrary command execution vulnerability in Usermin 1.750 and lower versions. This vulnerability has the same characteristics as the Webmin 1.900 RCE.

tags | exploit, arbitrary
SHA-256 | 505ea2f8624f6e3310d6adcbed739f255d5848596538d08bca4e2634ea2ba8d5
TransMac 12.3 Denial Of Service
Posted Feb 28, 2019
Authored by Alejandra Sanchez

TransMac version 12.3 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 412064fa5edcf00ced6b78b017347a3b832744568aeba5f1c58e79b27548ef80
Wireshark Analyzer 2.6.7
Posted Feb 28, 2019
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

Changes: Memory leak addressed. Various other updates.
tags | tool, sniffer, protocol
systems | windows, unix
SHA-256 | 747b3e7a37414942959f76f198be49dcbcca936bda538c4408942ce71bfd2b71
OpenSSL Toolkit 1.1.1b
Posted Feb 28, 2019
Site openssl.org

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

Changes: Added SCA hardening for modular field inversion in EC_GROUP through a new dedicated field_inv() pointer in EC_METHOD. Changed the info callback signals for the start and end of a post-handshake message exchange in TLSv1.3. Various other updates.
tags | tool, encryption, protocol
systems | unix
SHA-256 | 5c557b023230413dfb0756f3137a13e6d726838ccd1430888ad15bfb2b43ea4b
Red Hat Security Advisory 2019-0416-01
Posted Feb 28, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0416-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Issues addressed include a memory disclosure vulnerability.

tags | advisory, java
systems | linux, redhat
advisories | CVE-2019-2422
SHA-256 | 8f3bac9eaeba235ec1f3f98932b1e31388533eb546af550ac0b44834cb5726ae
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close