exploit the possibilities
Showing 1 - 15 of 15 RSS Feed

Files Date: 2019-07-02

Red Hat Security Advisory 2019-1669-01
Posted Jul 2, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-1669-01 - Nodes managed by Ironic may use the ironic-inspector auxiliary service to discover hardware properties. Hardware introspection or hardware properties discovery is a process of getting hardware parameters required for scheduling from a bare metal node, given its power management credentials. Issues addressed include a remote SQL injection vulnerability.

tags | advisory, remote, sql injection
systems | linux, redhat
advisories | CVE-2019-10141
MD5 | ca185105db80cc82a2e077cd2a610687
Ubuntu Security Notice USN-4044-1
Posted Jul 2, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4044-1 - znc could be made to crash or run programs as an administrator if it opened a specially crafted file.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2019-12816
MD5 | 536973672e7ecebbc7a661da6f837ebd
Ubuntu Security Notice USN-4045-1
Posted Jul 2, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4045-1 - A type confusion bug was discovered in Thunderbird. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could exploit this by causing a denial of service, or executing arbitrary code. It was discovered that a sandboxed child process could open arbitrary web content in the parent process via the Prompt:Open IPC message. When combined with another vulnerability, an attacker could potentially exploit this to execute arbitrary code. Various other issues were also addressed.

tags | advisory, web, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2019-11707, CVE-2019-11708
MD5 | 9fa133151559c278017a960cc0132070
Red Hat Security Advisory 2019-1661-01
Posted Jul 2, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-1661-01 - Spacewalk is an Open Source systems management solution that provides system provisioning, configuration and patching capabilities. An insecure computation issue was addressed.

tags | advisory
systems | linux, redhat
advisories | CVE-2019-10136
MD5 | d9aa65185f33c8fe16a7560f504a02f7
Red Hat Security Advisory 2019-1663-01
Posted Jul 2, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-1663-01 - Spacewalk is an Open Source systems management solution that provides system provisioning, configuration and patching capabilities. Issues addressed include a traversal vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2019-10137
MD5 | bb87add37871daf427abd3299a015a69
Red Hat Security Advisory 2019-1667-01
Posted Jul 2, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-1667-01 - KVM is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow
systems | linux, redhat
advisories | CVE-2018-20815
MD5 | 90d396ddc875c7da1333a68774fbf6ea
Red Hat Security Advisory 2019-1683-01
Posted Jul 2, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-1683-01 - openstack-tripleo-common contains the python library for code common to the Red Hat OpenStack Platform director CLI and GUI. An issue existed where openstack-tripleo-common allowed running new amphorae based on arbitrary images.

tags | advisory, arbitrary, python
systems | linux, redhat
advisories | CVE-2019-3895
MD5 | 000b36778e35e0340bbc4cb0ca78a977
Scapy Packet Manipulation Tool 2.4.3rc2
Posted Jul 2, 2019
Authored by Philippe Biondi | Site secdev.org

Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc.

Changes: Release candidate 2 for 2.4.3. Various updates.
tags | tool, scanner, python
systems | unix
MD5 | 94c6715819fe8bed90bc93251b4eab42
Red Hat Security Advisory 2019-1652-01
Posted Jul 2, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-1652-01 - The libssh2 packages provide a library that implements the SSH2 protocol. Issues addressed include an out of bounds write vulnerability.

tags | advisory, protocol
systems | linux, redhat
advisories | CVE-2019-3855, CVE-2019-3856, CVE-2019-3857, CVE-2019-3863
MD5 | d3621b29cc99665de8647ad9778affbe
Red Hat Security Advisory 2019-1650-01
Posted Jul 2, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-1650-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Issues addressed include an information leakage vulnerability.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2019-9824
MD5 | 85316b257f3a03398871c7f72b1ff61a
Debian Security Advisory 4475-1
Posted Jul 2, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4475-1 - Joran Dirk Greef discovered that overly long nonces used with ChaCha20-Poly1305 were incorrectly processed and could result in nonce reuse. This doesn't affect OpenSSL-internal uses of ChaCha20-Poly1305 such as TLS.

tags | advisory
systems | linux, debian
advisories | CVE-2019-1543
MD5 | 34429fca7bf584e4a71f6062c8f3cac3
Debian Security Advisory 4474-1
Posted Jul 2, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4474-1 - A sandbox escape was found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code if combined with additional vulnerabilities.

tags | advisory, web, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2019-11708
MD5 | ca6538055b670bc57db4e583fc68d053
Apache Tomcat CGIServlet enableCmdLineArguments Remote Code Execution
Posted Jul 2, 2019
Authored by sinn3r, Yakov Shafranovich | Site metasploit.com

This Metasploit module exploits a vulnerability in Apache Tomcat's CGIServlet component. When the enableCmdLineArguments setting is set to true, a remote user can abuse this to execute system commands, and gain remote code execution.

tags | exploit, remote, code execution
advisories | CVE-2019-0232
MD5 | 0d433a42b85642288aa8f83ab3ac6eb8
Serv-U FTP Server prepareinstallation Privilege Escalation
Posted Jul 2, 2019
Authored by Brendan Coles, Guy Levin | Site metasploit.com

This Metasploit module attempts to gain root privileges on systems running Serv-U FTP Server versions prior to 15.1.7. The Serv-U executable is setuid root, and uses ARGV[0] in a call to system(), without validation, when invoked with the -prepareinstallation flag, resulting in command execution with root privileges. This module has been tested successfully on Serv-U FTP Server version 15.1.6 (x64) on Debian 9.6 (x64).

tags | exploit, root
systems | linux, debian
advisories | CVE-2019-12181
MD5 | 1d12f5062e9025a10eced07459b45d73
Centreon 19.04 Remote Code Execution
Posted Jul 2, 2019
Authored by Askar

Centreon version 19.04 suffers from an authenticated remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2019-13024
MD5 | adb4a5ce78160a67950db7c59daad26d
Page 1 of 1
Back1Next

File Archive:

September 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    1 Files
  • 2
    Sep 2nd
    38 Files
  • 3
    Sep 3rd
    30 Files
  • 4
    Sep 4th
    15 Files
  • 5
    Sep 5th
    12 Files
  • 6
    Sep 6th
    17 Files
  • 7
    Sep 7th
    3 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    24 Files
  • 10
    Sep 10th
    22 Files
  • 11
    Sep 11th
    22 Files
  • 12
    Sep 12th
    15 Files
  • 13
    Sep 13th
    5 Files
  • 14
    Sep 14th
    2 Files
  • 15
    Sep 15th
    1 Files
  • 16
    Sep 16th
    11 Files
  • 17
    Sep 17th
    16 Files
  • 18
    Sep 18th
    8 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close