exploit the possibilities
Showing 1 - 25 of 52 RSS Feed

Files Date: 2019-08-15

Ubuntu Security Notice USN-4099-1
Posted Aug 15, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4099-1 - Jonathan Looney discovered that nginx incorrectly handled the HTTP/2 implementation. A remote attacker could possibly use this issue to consume resources, leading to a denial of service.

tags | advisory, remote, web, denial of service
systems | linux, ubuntu
advisories | CVE-2019-9511
MD5 | 065857c9846497d4bbb6bafa9efaa8f6
Gentoo Linux Security Advisory 201908-19
Posted Aug 15, 2019
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201908-19 - A vulnerability in GNU Wget might allow an attacker to execute arbitrary code. Versions less than 1.20.3 are affected.

tags | advisory, arbitrary
systems | linux, gentoo
advisories | CVE-2019-5953
MD5 | 45f0da35e5daf05683da003e35f59923
Adobe Acrobat Reader DC For Windows JP2 Stream Double-Free
Posted Aug 15, 2019
Authored by Google Security Research, mjurczyk

Adobe Acrobat Reader DC for Windows suffers from a double-free vulnerability due to a malformed JP2 stream.

tags | exploit
systems | windows
advisories | CVE-2019-8044
MD5 | 160feb95df0fc9a1e82853c12dfe4902
Red Hat Security Advisory 2019-2512-01
Posted Aug 15, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-2512-01 - Subversion is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Issues addressed include denial of service and null pointer vulnerabilities.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
advisories | CVE-2019-0203
MD5 | 4402a1ce1b1898ad3c143326f7c77fe6
Adobe Acrobat Reader DC For Windows Uninitialized Pointer free()
Posted Aug 15, 2019
Authored by Google Security Research, mjurczyk

Adobe Acrobat Reader DC for Windows could trigger a free() of an uninitialized pointer due to malformed JBIG2Globals streams.

tags | exploit
systems | windows
advisories | CVE-2019-8045
MD5 | 3f21ec47601fc53448cb7481e0251edb
Adobe Acrobat Reader DC For Windows JP2 Stream Buffer Overflow
Posted Aug 15, 2019
Authored by Google Security Research, mjurczyk

Adobe Acrobat Reader DC for Windows suffers from a heap-based buffer overflow vulnerability due to a malformed JP2 stream.

tags | exploit, overflow
systems | windows
advisories | CVE-2019-8046
MD5 | 9e1ad5153c06fb8dc4fc0e8492622aee
Gentoo Linux Security Advisory 201908-18
Posted Aug 15, 2019
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201908-18 - Multiple vulnerabilities have been found in Chromium and Google Chrome, the worst of which could allow remote attackers to execute arbitrary code. Versions less than 76.0.3809.100 are affected.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2019-5805, CVE-2019-5806, CVE-2019-5807, CVE-2019-5808, CVE-2019-5809, CVE-2019-5810, CVE-2019-5811, CVE-2019-5812, CVE-2019-5813, CVE-2019-5814, CVE-2019-5815, CVE-2019-5816, CVE-2019-5817, CVE-2019-5818, CVE-2019-5819, CVE-2019-5820, CVE-2019-5821, CVE-2019-5822, CVE-2019-5823, CVE-2019-5828, CVE-2019-5829, CVE-2019-5830, CVE-2019-5831, CVE-2019-5832, CVE-2019-5833, CVE-2019-5834, CVE-2019-5835, CVE-2019-5836
MD5 | c669f93bfc8a96c9c1b3454a78cdc1c6
Red Hat Security Advisory 2019-2508-01
Posted Aug 15, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-2508-01 - Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow
systems | linux, redhat
advisories | CVE-2019-10192
MD5 | 9ebf7b727a1ff45a1dbf14cbf1bf0dec
Adobe Acrobat Reader DC For Windows Malformed TTF Font Memory Corruption
Posted Aug 15, 2019
Authored by Google Security Research, mjurczyk

Adobe Acrobat Reader DC for Windows suffers from a heap-based memory corruption vulnerability due to a malformed TTF font.

tags | exploit
systems | windows
advisories | CVE-2019-8042
MD5 | 49d536fcb38029665c8112bc8ca695b7
Adobe Acrobat Reader DC For Windows CoolType.dll Buffer Overflow
Posted Aug 15, 2019
Authored by Google Security Research, mjurczyk

Adobe Acrobat Reader DC for Windows suffers from a heap-based buffer overflow vulnerability in CoolType.dll.

tags | exploit, overflow
systems | windows
advisories | CVE-2019-8041
MD5 | 5da6e14914985af3b4d8f0f35fab4dc1
Adobe Acrobat Reader DC For Windows Malformed Font Stream Buffer Overflow
Posted Aug 15, 2019
Authored by Google Security Research, mjurczyk

Adobe Acrobat Reader DC for Windows suffers from a heap-based buffer overflow vulnerability due to a malformed font stream.

tags | exploit, overflow
systems | windows
advisories | CVE-2019-8049
MD5 | c76e5f4221d74b1ac2a85a8d36b40926
Adobe Acrobat Reader DC For Windows Malformed Font Stream Buffer Overflow
Posted Aug 15, 2019
Authored by Google Security Research, mjurczyk

Adobe Acrobat Reader DC for Windows suffers from a static buffer overflow vulnerability due to a malformed font stream.

tags | exploit, overflow
systems | windows
advisories | CVE-2019-8048
MD5 | f9abbd638418513b43bdd4a685c66d12
Gentoo Linux Security Advisory 201908-17
Posted Aug 15, 2019
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201908-17 - A vulnerability in ZeroMQ might allow an attacker to execute arbitrary code. Versions less than 4.3.2 are affected.

tags | advisory, arbitrary
systems | linux, gentoo
advisories | CVE-2019-13132
MD5 | 3ab116f1e22ab973e06b2f78690c9cba
Red Hat Security Advisory 2019-2511-01
Posted Aug 15, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-2511-01 - MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon, mysqld, and many client programs. As usual, Oracle refuses to give details on the vulnerabilities.

tags | advisory, vulnerability
systems | linux, redhat
advisories | CVE-2019-2420, CVE-2019-2434, CVE-2019-2436, CVE-2019-2455, CVE-2019-2481, CVE-2019-2482, CVE-2019-2486, CVE-2019-2494, CVE-2019-2495, CVE-2019-2502, CVE-2019-2503, CVE-2019-2507, CVE-2019-2510, CVE-2019-2528, CVE-2019-2529, CVE-2019-2530, CVE-2019-2531, CVE-2019-2532, CVE-2019-2533, CVE-2019-2534, CVE-2019-2535, CVE-2019-2536, CVE-2019-2537, CVE-2019-2539, CVE-2019-2580, CVE-2019-2581, CVE-2019-2584, CVE-2019-2585
MD5 | 5cfb9f6bd94446cd2d6c1fca4f42a064
Adobe Acrobat Reader DC For Windows Malformed PDF Buffer Overflow
Posted Aug 15, 2019
Authored by Google Security Research, mjurczyk

Adobe Acrobat Reader DC for Windows suffers from a heap-based buffer overflow vulnerability while processing malformed PDF files.

tags | exploit, overflow
systems | windows
advisories | CVE-2019-8050
MD5 | 07fbd913c02bfc0914d6b60dc2f267b1
Adobe Acrobat Reader DC For Windows JP2 Stream Use-After-Free
Posted Aug 15, 2019
Authored by Google Security Research, mjurczyk

Adobe Acrobat Reader DC for Windows suffers from a use-after-free vulnerability due to a malformed JP2 stream.

tags | exploit
systems | windows
advisories | CVE-2019-8024
MD5 | c356fb26714cf580caa35417489e7bce
Gentoo Linux Security Advisory 201908-16
Posted Aug 15, 2019
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201908-16 - A vulnerability in ProFTPD could result in the arbitrary execution of code. Versions less than 1.3.6-r5 are affected.

tags | advisory, arbitrary
systems | linux, gentoo
advisories | CVE-2019-12815
MD5 | 4f679a291bc0cfa34a4d5f5f216d8221
Red Hat Security Advisory 2019-2507-01
Posted Aug 15, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-2507-01 - KVM is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow
systems | linux, redhat
advisories | CVE-2018-20815
MD5 | 99277ea2e9859d79894114c865f9ef8f
Adobe Acrobat Reader DC For Windows JP2 Stream Out-Of-Bounds Read
Posted Aug 15, 2019
Authored by Google Security Research, mjurczyk

Adobe Acrobat Reader DC for Windows suffers from a heap-based out-of-bounds read vulnerability due to a malformed JP2 stream.

tags | exploit
systems | windows
advisories | CVE-2019-8043
MD5 | 030db208b951bd063ffb31e2218b631b
Gentoo Linux Security Advisory 201908-15
Posted Aug 15, 2019
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201908-15 - A vulnerability in ZNC allows users to escalate privileges. Versions less than 1.7.4_rc1 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2019-12816
MD5 | d5fa985bad9cb13ada58dd00d50a6524
Microsoft Font Subsetting DLL FixSbitSubTableFormat1 Out-Of-Bounds Read
Posted Aug 15, 2019
Authored by Google Security Research, mjurczyk

Microsoft Font Subsetting DLL suffers from a heap-based out-of-bounds read vulnerability in FixSbitSubTableFormat1.

tags | exploit
advisories | CVE-2019-1153
MD5 | 55a09d6b95da977abd7a21440e6e7191
Gentoo Linux Security Advisory 201908-14
Posted Aug 15, 2019
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201908-14 - Multiple vulnerabilities have been found in polkit, the worst of which could result in privilege escalation. Versions less than 0.115-r2 are affected.

tags | advisory, vulnerability
systems | linux, gentoo
advisories | CVE-2018-1116, CVE-2018-19788
MD5 | 435b7afe44096e91fa363dda02566836
Red Hat Security Advisory 2019-2506-01
Posted Aug 15, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-2506-01 - Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow
systems | linux, redhat
advisories | CVE-2019-10192
MD5 | d59755f7501ed1f81d292a2af294d06a
Microsoft Font Subsetting DLL MakeFormat12MergedGlyphList Heap Corruption
Posted Aug 15, 2019
Authored by Google Security Research, mjurczyk

Microsoft Font Subsetting DLL suffers from a heap corruption vulnerability in MakeFormat12MergedGlyphList.

tags | exploit
advisories | CVE-2019-1152
MD5 | b390832ce1914d9f6f8ad1fc7dcc443f
Microsoft Font Subsetting DLL WriteTableFromStructure Out-Of-Bounds Read
Posted Aug 15, 2019
Authored by Google Security Research, mjurczyk

Microsoft Font Subsetting DLL suffers from a heap-based out-of-bounds read vulnerability in WriteTableFromStructure.

tags | exploit
advisories | CVE-2019-1150
MD5 | 2e11d2396512a610cd0ccb4456e3a79e
Page 1 of 3
Back123Next

File Archive:

October 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    24 Files
  • 2
    Oct 2nd
    15 Files
  • 3
    Oct 3rd
    7 Files
  • 4
    Oct 4th
    4 Files
  • 5
    Oct 5th
    10 Files
  • 6
    Oct 6th
    1 Files
  • 7
    Oct 7th
    21 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    5 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    17 Files
  • 12
    Oct 12th
    4 Files
  • 13
    Oct 13th
    4 Files
  • 14
    Oct 14th
    15 Files
  • 15
    Oct 15th
    19 Files
  • 16
    Oct 16th
    19 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close