exploit the possibilities
Showing 1 - 10 of 10 RSS Feed

Files Date: 2019-08-09

Gentoo Linux Security Advisory 201908-05
Posted Aug 9, 2019
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201908-5 - Multiple vulnerabilities have been found in LibVNCServer, the worst of which could result in the arbitrary execution of code. Versions less than 0.9.12 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2018-20019, CVE-2018-20020, CVE-2018-20021, CVE-2018-20022, CVE-2018-20023, CVE-2018-20024, CVE-2018-7225, CVE-2018-7226
MD5 | 34625c253ad49372c4d4dd4b9a0493fe
Gentoo Linux Security Advisory 201908-04
Posted Aug 9, 2019
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201908-4 - Multiple vulnerabilities have been found in Redis, the worst of which may allow execution of arbitrary code. Versions less than 4.0.14 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2018-11218, CVE-2018-11219, CVE-2019-10192, CVE-2019-10193
MD5 | d9efe38de244d39f025ae37d4dbc67b3
Gentoo Linux Security Advisory 201908-03
Posted Aug 9, 2019
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201908-3 - Multiple vulnerabilities have been found in JasPer, the worst of which could result in a Denial of Service condition. Versions less than or equal to 2.0.16 are affected.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
advisories | CVE-2017-1000050, CVE-2017-13745, CVE-2017-13746, CVE-2017-13747, CVE-2017-13748, CVE-2017-13749, CVE-2017-13750, CVE-2017-13751, CVE-2017-13752, CVE-2017-13753, CVE-2017-14132, CVE-2017-14229, CVE-2017-14232, CVE-2017-5503, CVE-2017-5504, CVE-2017-5505, CVE-2017-6851, CVE-2017-6852, CVE-2017-9782, CVE-2018-18873, CVE-2018-20584, CVE-2018-9055, CVE-2018-9154
MD5 | bc4169d0994bb4a2ae88beb5107c83a7
Bro Network Security Monitor 2.6.3
Posted Aug 9, 2019
Authored by Robin Sommer, Vern Paxson | Site bro.org

Bro is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Bro provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Bro has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Bro's user community includes major universities, research labs, supercomputing centers, and open-science communities.

Changes: This is a security patch release to address potential denial of service vulnerabilities.
tags | tool, intrusion detection
systems | unix
MD5 | 498da0f8d334f27b2040e7075b60240c
Guide To Red Team Operations
Posted Aug 9, 2019
Authored by Yashika Dhir | Site hackingarticles.in

This is a guide to red teaming operations. It covers the basic questions like what is a red team, differences between red teaming and vulnerability assessments along with advance theory such as how red team engagements are done. Thought processes and legal processes are also covered.

tags | paper
MD5 | c25427974dfcb3544ebd6e303dc10e16
D-Link DIR-600M Wireless N 150 Home Router Access Bypass
Posted Aug 9, 2019
Authored by Devendra Solanki

A remote vulnerability was discovered on D-Link DIR-600M Wireless N 150 Home Router in multiple respective firmware versions. The vulnerability provides unauthenticated remote access to the router's WAN configuration page i.e. "wan.htm", which leads to disclosure of sensitive user information including but not limited to PPPoE, DNS configuration etc, also allowing to change the configuration settings as well. Metasploit module and NSE scripts are included.

tags | exploit, remote
advisories | CVE-2019-13101
MD5 | 4b99c969adcc494c0182664d23ba5a61
Ubuntu Security Notice USN-4090-1
Posted Aug 9, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4090-1 - Tom Lane discovered that PostgreSQL did not properly restrict functions declared as "SECURITY DEFINER". An attacker could use this to execute arbitrary SQL with the permissions of the function owner. Andreas Seltenreich discovered that PostgreSQL did not properly handle user-defined hash equality operators. An attacker could use this to expose sensitive information. This issue only affected Ubuntu 19.04. Various other issues were also addressed.

tags | advisory, arbitrary
systems | linux, ubuntu
advisories | CVE-2019-10208, CVE-2019-10209
MD5 | ccaf4895e6cf0e7558139305e2b1c8b5
Red Hat Security Advisory 2019-2425-01
Posted Aug 9, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-2425-01 - KVM is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include buffer overflow and information leakage vulnerabilities.

tags | advisory, overflow, vulnerability
systems | linux, redhat
advisories | CVE-2018-15746, CVE-2018-17958, CVE-2018-17963, CVE-2019-6501, CVE-2019-6778, CVE-2019-9824
MD5 | bcb9ad82a577245570491b675be20b9a
Debian Security Advisory 4493-1
Posted Aug 9, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4493-1 - Two security issues have been discovered in the PostgreSQL database system, which could result in privilege escalation, denial of service or memory disclosure.

tags | advisory, denial of service
systems | linux, debian
advisories | CVE-2019-10208, CVE-2019-10209
MD5 | 4425ba69c4e109bad5da897ac9cbe1e2
Debian Security Advisory 4492-1
Posted Aug 9, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4492-1 - A issue has been discovered in the PostgreSQL database system, which could result in privilege escalation.

tags | advisory
systems | linux, debian
advisories | CVE-2019-10208
MD5 | 4d9c0eb1a4850c00c8ceea2eb3aa4461
Page 1 of 1
Back1Next

File Archive:

October 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    24 Files
  • 2
    Oct 2nd
    15 Files
  • 3
    Oct 3rd
    7 Files
  • 4
    Oct 4th
    4 Files
  • 5
    Oct 5th
    10 Files
  • 6
    Oct 6th
    1 Files
  • 7
    Oct 7th
    21 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    5 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    17 Files
  • 12
    Oct 12th
    4 Files
  • 13
    Oct 13th
    4 Files
  • 14
    Oct 14th
    15 Files
  • 15
    Oct 15th
    19 Files
  • 16
    Oct 16th
    19 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close