exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2019-05-27

Typora 0.9.9.24.6 Directory Traversal
Posted May 27, 2019
Authored by Dhiraj Mishra

Typora version 0.9.9.24.6 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2019-12137
SHA-256 | d701e0872d46eff9fc856c8428a213430d7d1c726d700916ecbb1772e5e4f60e
Red Hat Security Advisory 2019-1278-01
Posted May 27, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-1278-01 - The Pacemaker cluster resource manager is a collection of technologies working together to maintain data integrity and application availability in the event of failures. Issues addressed include denial of service, information leakage, and use-after-free vulnerabilities.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
advisories | CVE-2018-16877, CVE-2018-16878, CVE-2019-3885
SHA-256 | 0e135f17b3765f202d2a89491dcc2b769dbf1e71b955b09f7ddac4773c2da49f
Crowd / Crowd Data Center pdkinstall Enabled
Posted May 27, 2019
Authored by Atlassian

Crowd and Crowd Data Center had the pdkinstall development plugin incorrectly enabled in release builds. Attackers who can send unauthenticated or authenticated requests to a Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution on systems running a vulnerable version of Crowd or Crowd Data Center. Versions of Crowd and Crowd Data Center starting with version 2.1.0 before 3.0.5 (the fixed version for 3.0.x), from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x), from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x), from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x), from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2019-11580
SHA-256 | 985c2d75d6a00aea412d56a69bb859b3edd00658270d8705e9aa0d84f96b275d
Ubuntu Security Notice USN-3976-4
Posted May 27, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3976-4 - USN-3976-1 fixed a vulnerability in Samba. The update introduced a regression causing Samba to occasionally crash. This update fixes the problem. Isaac Boukris and Andrew Bartlett discovered that Samba incorrectly checked S4U2Self packets. In certain environments, a remote attacker could possibly use this issue to escalate privileges. Various other issues were also addressed.

tags | advisory, remote
systems | linux, ubuntu
SHA-256 | 82c6e4a625ca6c1d609e15a9fd856e2251b6b0189c2cad0ac57edabde763c2ef
Red Hat Security Advisory 2019-1279-01
Posted May 27, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-1279-01 - The Pacemaker cluster resource manager is a collection of technologies working together to maintain data integrity and application availability in the event of failures. Issues addressed include denial of service, information leakage, and use-after-free vulnerabilities.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
advisories | CVE-2018-16877, CVE-2018-16878, CVE-2019-3885
SHA-256 | 7a05d125130c1df4d51bedc27605da4d8a11ae06788bc388eb16613fb6cab048
Kanboard 1.2.7 Cross Site Scripting
Posted May 27, 2019
Authored by Mithat Gogebakan | Site netsparker.com

Kanboard version 1.2.7 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2019-7324
SHA-256 | a58b7d6eeb41ea41e14a67f936e8739705bd08162e668835de7bf2b9bb704ad7
Deltek Maconomy 2.2.5 Local File Inclusion
Posted May 27, 2019
Authored by Jameel Nabbo

Deltek Maconomy version 2.2.5 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
advisories | CVE-2019-12314
SHA-256 | f2cecf22cbc31eab8ed4e6c44b59435d507f9fbc96f52b16c9d342cea5cf19d5
MacOS X 10.14.5 Gatekeeper Bypass
Posted May 27, 2019
Authored by Filippo Cavallarin

MacOS X versions 10.14.5 and below suffer from a Gatekeeper bypass vulnerability.

tags | exploit, bypass
SHA-256 | 76e6187e250514c50b8fb1fa0a230303592e3a59928db823711053d46ba942c4
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close