exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2019-10-28

Stegano 0.9.7
Posted Oct 28, 2019
Authored by Cedric Bonhomme | Site github.com

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

Changes: Fixed markdown of the previous release.
tags | tool, encryption, steganography, python
systems | unix
SHA-256 | 815698777c2f3f079d972fabf9f944194febb1efa769ea2a8940dd41d5d1667f
Microsoft Windows Insecure CSharedStream Object Privilege Escalation
Posted Oct 28, 2019
Authored by James Forshaw, Google Security Research

Microsoft Windows suffers from an insecure CSharedStream object privilege escalation vulnerability.

tags | exploit
systems | windows
SHA-256 | 9abd67b8467f3e60623b8e86d9c7f4d8fade22c3b12d417cba3715c52580f6f9
WebKit HTMLFrameElementBase::isURLAllowed Universal Cross Site Scripting
Posted Oct 28, 2019
Authored by Google Security Research, Glazvunov

WebKit suffers from an HTMLFrameElementBase::isURLAllowed universal cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 408eee81bf05626112665dd417b2dde7924a6d1ed0dadfd93c8ea516c4f61b79
Infosysta Jira 1.6.13_J8 User Name Disclosure
Posted Oct 28, 2019
Authored by Erik Steltzner, Sascha Heider, Fabian Krone | Site syss.de

Infosysta Jira version 1.6.13_J8 suffers from a user name disclosure vulnerability.

tags | exploit
advisories | CVE-2019-16907
SHA-256 | 506fa47855ab00052d2c3b374f021b09caf1e85be4e4a010161eed8775c5f5b8
Infosysta Jira 1.6.13_J8 Project List Authentication Bypass
Posted Oct 28, 2019
Authored by Erik Steltzner, Sascha Heider, Fabian Krone | Site syss.de

Infosysta Jira version 1.6.13_J8 suffers from an authentication bypass vulnerability that allows you to see project lists.

tags | exploit, bypass
advisories | CVE-2019-16908, CVE-2019-16909
SHA-256 | 5759cf071d560c4da28fae8baa88ebacb2d306e5d1cfc0ae9d1a454907d296b8
Infosysta Jira 1.6.13_J8 Push Notification Authentication Bypass
Posted Oct 28, 2019
Authored by Erik Steltzner, Sascha Heider, Fabian Krone | Site syss.de

Infosysta Jira version 1.6.13_J8 suffers from an authentication bypass vulnerability that allows you to see push notifications for a given user.

tags | exploit, bypass
advisories | CVE-2019-16906
SHA-256 | 01fd0ed65d6bb484afc3a2b833eae1e73bda43947aa08a133d177919fadef778
Ubuntu Security Notice USN-4166-1
Posted Oct 28, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4166-1 - It was discovered that PHP incorrectly handled certain paths when being used in FastCGI configurations. A remote attacker could possibly use this issue to execute arbitrary code.

tags | advisory, remote, arbitrary, php
systems | linux, ubuntu
advisories | CVE-2019-11043
SHA-256 | e143091751be9bfe1dfc212b61e56fc89b156a66fdac6f4080c1243bdbc409c0
Red Hat Security Advisory 2019-3209-01
Posted Oct 28, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-3209-01 - The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. A privilege escalation vulnerability was addressed.

tags | advisory, root
systems | linux, redhat
advisories | CVE-2019-14287
SHA-256 | b2c78ef601cf2bdfcef34a0c5b3e7e351dcb97f43120a2c60d9873a427019a64
Gentoo Linux Security Advisory 201910-01
Posted Oct 28, 2019
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201910-1 - A vulnerability in PHP might allow an attacker to execute arbitrary code. Versions less than 7.1.33 are affected.

tags | advisory, arbitrary, php
systems | linux, gentoo
advisories | CVE-2019-11043
SHA-256 | a6d82ade737db57082fff3a1c19c65c1890fcde1110a0bf7f1952217ef2a3e9d
ChaosPro 2.0 Buffer Overflow
Posted Oct 28, 2019
Authored by Chase Hatch

ChaosPro version 2.0 SEH buffer overflow exploit.

tags | exploit, overflow
SHA-256 | ddd69b766e659956f62f3d710f3028d2e19dcc240bbf9bd5d345931c410c2237
waldronmatt FullCalendar-BS4-PHP-MySQL-JSON 1.21 Cross Site Scripting
Posted Oct 28, 2019
Authored by Cakes

waldronmatt FullCalendar-BS4-PHP-MySQL-JSON version 1.21 suffers from a cross site scripting vulnerability.

tags | exploit, php, xss
SHA-256 | 7bd33179e72f3eb2716b76f370cbc499c313b43e1c9a043a65fb9a2c48300585
delpino73 Blue-Smiley-Organizer 1.32 SQL Injection
Posted Oct 28, 2019
Authored by Cakes

delpino73 Blue-Smiley-Organizer version 1.32 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 32f0e28bc7a0f69a86e68df77f94360461fc1a684a6c9f86312004b882c4bc41
waldronmatt FullCalendar-BS4-PHP-MySQL-JSON 1.21 SQL Injection
Posted Oct 28, 2019
Authored by Cakes

waldronmatt FullCalendar-BS4-PHP-MySQL-JSON version 1.21 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 353b3794ce8cd52da8c65e4a0d393d9bec71817e1bfd4c802b7c9b29fa1c3310
Intelbras Router WRN150 1.0.18 Cross Site Request Forgery
Posted Oct 28, 2019
Authored by Prof. Joas Antonio

Intelbras Router WRN150 version 1.0.18 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | ef7c930d6c05d382986bea588e3f4b50bf4fd0628135a875fbd8fe63e70686cd
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close