exploit the possibilities
Showing 1 - 18 of 18 RSS Feed

Files Date: 2020-01-16

Wireshark Analyzer 3.2.1
Posted Jan 16, 2020
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

Changes: One vulnerability and multiple bug fixes have been addressed.
tags | tool, sniffer, protocol
systems | windows, unix
advisories | CVE-2020-7044
SHA-256 | 589f640058d6408ebbd695a80ebbd6e7bd99d8db64ecda253d27100dfd27e85b
Red Hat Security Advisory 2020-0134-01
Posted Jan 16, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0134-01 - .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET Core that address security vulnerabilities are now available. The updated versions are .NET Core SDK 3.0.102, .NET Core Runtime 3.0.2, .NET Core SDK 3.1.101 and .NET Core Runtime 3.1.1. Security Fixes: dotnet: Memory Corruption in SignalR. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
advisories | CVE-2020-0602, CVE-2020-0603
SHA-256 | f869d8c44228bf0cb537cd6d5822c5d280a6cd2654a27d3d1223bbbdf2d1319c
WordPress Resim ara 1.0 Cross Site Scripting
Posted Jan 16, 2020
Authored by Ricardo Sanchez

WordPress Resim ara plugin version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | e651608d5e3402eb3eb0d910d740e2145dfcd684707794959b960b189a658fed
Red Hat Security Advisory 2020-0132-01
Posted Jan 16, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0132-01 - Red Hat Process Automation Manager is an open source business process management suite that combines process management and decision service management and enables business and IT users to create, manage, validate, and deploy process applications and decision services. This release of Red Hat Process Automation Manager 7.6.0 serves as an update to Red Hat Process Automation Manager 7.5.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include a cross site scripting vulnerability.

tags | advisory, xss
systems | linux, redhat
advisories | CVE-2016-10735, CVE-2018-20676, CVE-2018-20677, CVE-2019-14886
SHA-256 | d79d5fb27c4e6ac1b11fa6d2ad6bb8b94b8c534d590d9e400c1418318ea052e1
Red Hat Security Advisory 2020-0133-01
Posted Jan 16, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0133-01 - Red Hat Decision Manager is an open source decision management platform that combines business rules management, complex event processing, Decision Model & Notation execution, and Business Optimizer for solving planning problems. It automates business decisions and makes that logic available to the entire business. This release of Red Hat Decision Manager 7.6.0 serves as an update to Red Hat Decision Manager 7.5.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include a cross site scripting vulnerability.

tags | advisory, xss
systems | linux, redhat
advisories | CVE-2016-10735, CVE-2018-20676, CVE-2018-20677, CVE-2019-14886
SHA-256 | a7ca0298e8834bc41c1f34dca26b3b07b8416df6141b74961c4c4541cbf0f6f1
Red Hat Security Advisory 2020-0130-01
Posted Jan 16, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0130-01 - .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET Core that address security vulnerabilities are now available. The updated versions are .NET Core SDK 3.0.102 and .NET Core Runtime 3.0.2. Security Fixes: dotnet: Memory Corruption in SignalR. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
advisories | CVE-2020-0602, CVE-2020-0603
SHA-256 | 459b14ca4d33e258947b6b62d44a5953684082327f9aec285f4a54e04eb882a9
Red Hat Security Advisory 2020-0124-01
Posted Jan 16, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0124-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a code execution vulnerability.

tags | advisory, code execution
systems | linux, redhat
advisories | CVE-2019-1387
SHA-256 | 71e2022c05e5a03b62e2845a453bc675f5131251199607d15d7db5a44fc3b703
Red Hat Security Advisory 2020-0122-01
Posted Jan 16, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0122-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Issues addressed include a deserialization vulnerability.

tags | advisory, java
systems | linux, redhat
advisories | CVE-2020-2583, CVE-2020-2590, CVE-2020-2593, CVE-2020-2601, CVE-2020-2604, CVE-2020-2654, CVE-2020-2655
SHA-256 | bdab1bfe4a84d3390eb90e48e33251d4b03b5a8842fcbd0f79be5056b303984f
Citrix ADC / Gateway Path Traversal
Posted Jan 16, 2020
Authored by Dhiraj Mishra

This is an nmap nse script to test for the path traversal vulnerability in Citrix Application Delivery Controller (ADC) and Gateway.

tags | exploit, file inclusion
advisories | CVE-2019-19781
SHA-256 | 078997b326852f40549231510ea278d6e98e39608b88703f2a45f6a9734b1d28
Red Hat Security Advisory 2020-0128-01
Posted Jan 16, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0128-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Issues addressed include a deserialization vulnerability.

tags | advisory, java
systems | linux, redhat
advisories | CVE-2020-2583, CVE-2020-2590, CVE-2020-2593, CVE-2020-2601, CVE-2020-2604, CVE-2020-2654, CVE-2020-2655
SHA-256 | 5617d29628ffce51248eb0b2e505408cf48cbd53d7e49c4947c1db6e437c17a5
Red Hat Security Advisory 2020-0127-01
Posted Jan 16, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0127-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 68.4.1. Issues addressed include a bypass vulnerability.

tags | advisory, bypass
systems | linux, redhat
advisories | CVE-2019-17016, CVE-2019-17017, CVE-2019-17022, CVE-2019-17024, CVE-2019-17026
SHA-256 | 44614054f887702a1b73ddac192a945c34a21ce122434fee39ad630000950f61
Red Hat Security Advisory 2020-0120-01
Posted Jan 16, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0120-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 68.4.1. Issues addressed include a bypass vulnerability.

tags | advisory, bypass
systems | linux, redhat
advisories | CVE-2019-17016, CVE-2019-17017, CVE-2019-17022, CVE-2019-17024, CVE-2019-17026
SHA-256 | 8f148e2051df09d59bcec8ed2a4f61c9caa5b20001632d894c56ee8b55225df1
Jenkins Gitlab Hook 1.4.2 Cross Site Scripting
Posted Jan 16, 2020
Authored by Ai Ho

Jenkins Gitlab Hook plugin version 1.4.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2020-2096
SHA-256 | 38931217cabd4d17c01cf04d878ac4d8c49d23973f783f5ba2fd442676454822
Red Hat Security Advisory 2020-0123-01
Posted Jan 16, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0123-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 68.4.1. Issues addressed include a bypass vulnerability.

tags | advisory, bypass
systems | linux, redhat
advisories | CVE-2019-17016, CVE-2019-17017, CVE-2019-17022, CVE-2019-17024, CVE-2019-17026
SHA-256 | 6e1d9ec6178b22b026cde8325f51bd2f5e140aed5e63f063575db0d4085c4fc3
CurveBall Microsoft Windows CryptoAPI Spoofing Proof Of Concept
Posted Jan 16, 2020
Authored by Ollypwn

Proof of concept exploit for the Microsoft Windows CurveBall vulnerability where the signature of certificates using elliptic curve cryptography (ECC) is not correctly verified. ECC relies on different parameters. These parameters are standardized for many curves. However, Microsoft did not check all these parameters. The parameter G (the generator) was not checked, and the attacker can therefore supply his own generator, such that when Microsoft tries to validate the certificate against a trusted CA, it will only look for matching public keys, and then use then use the generator of the certificate.

tags | exploit, proof of concept
systems | windows
advisories | CVE-2020-0601
SHA-256 | d9f0b10579f568648f3f6770ab1c8d5cbdf6c5bf56bd77131137a69282cb97e2
CurveBall Microsoft Windows CryptoAPI Spoofing Proof Of Concept
Posted Jan 16, 2020
Authored by Kudelski Security

This is a proof of concept exploit that demonstrates the Microsoft Windows CryptoAPI spoofing vulnerability as described in CVE-2020-0601 and disclosed by the NSA.

tags | exploit, spoof, proof of concept
systems | windows
advisories | CVE-2020-0601
SHA-256 | dbcf6e21e9b280b90adc6d4dc06dc38feadb3dd70aef54f167d5df5417901041
Tautulli 2.1.9 Denial Of Service
Posted Jan 16, 2020
Authored by Ismail Tasdelen

This Metasploit module exploits a denial of service vulnerability in Tautulli version 2.1.9.

tags | exploit, denial of service
advisories | CVE-2019-19833
SHA-256 | fbb3636b00c64236d925b46f5ec620bfafe94e8df1864693a95b713266ef3d2c
Online Book Store 1.0 Arbitrary File Upload
Posted Jan 16, 2020
Authored by Or4nG.M4N

Online Book Store version 1.0 suffers from an arbitrary file upload vulnerability.

tags | exploit, arbitrary, file upload
SHA-256 | 29a1415af9bd66ab7d42e7bc62b1ff4cbaf0999ef20d117cdf573492b7c6c2b5
Page 1 of 1
Back1Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    17 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close