exploit the possibilities
Showing 1 - 15 of 15 RSS Feed

Files Date: 2020-02-26

PHP-Fusion CMS 9.03 Cross Site Scripting
Posted Feb 26, 2020
Authored by R. Jaafar, S. Maskan, W. Ikram, M. Ali, N. Ramadhan | Site sec-consult.com

PHP-Fusion CMS versions 9 through 9.03 suffer from multiple cross site scripting vulnerabilities.

tags | exploit, php, vulnerability, xss
MD5 | 36a37562129264fbf48b58ea5bfeefa3
Business Live Chat Software 1.0 Cross Site Request Forgery
Posted Feb 26, 2020
Authored by Meisam Monsef

Business Live Chat Software version 1.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | 1d1320830e23d19fa1d2597a945b9b99
Red Hat Security Advisory 2020-0609-01
Posted Feb 26, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0609-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow and use-after-free vulnerabilities.

tags | advisory, overflow, kernel, vulnerability
systems | linux, redhat
advisories | CVE-2018-20976, CVE-2019-11085, CVE-2019-14895, CVE-2019-17133
MD5 | 49c446e887152f53e4978a368b950ed7
PhpIX 2012 Professional (Beta) SQL Injection
Posted Feb 26, 2020
Authored by indoushka

PhpIX 2012 Professional (Beta) suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 7fbef1912efd9284d0eff62c2acdb7ed
Core FTP LE 2.2 Denial Of Service
Posted Feb 26, 2020
Authored by Ismael Nava

Core FTP LE version 2.2 suffers from a denial of service vulnerability.

tags | exploit, denial of service
MD5 | f89d765e78554189a4940369213bc867
Red Hat Security Advisory 2020-0605-01
Posted Feb 26, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0605-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This asynchronous patch is a security update for the wildfly-security-manager package in Red Hat JBoss Enterprise Application Platform 7.2 for Red Hat Enterprise Linux 6, 7, and 8.

tags | advisory, java
systems | linux, redhat
advisories | CVE-2020-7238
MD5 | f5cd433139be364da745075df021fd95
Apache Tomcat AJP Ghostcat File Read / Inclusion
Posted Feb 26, 2020
Authored by ydhcui

Apache Tomcat AJP Ghostcat file read and inclusion exploit.

tags | exploit, file inclusion
advisories | CVE-2020-10487
MD5 | 28027f46fb9f230fd41b684c0e835073
Red Hat Security Advisory 2020-0606-01
Posted Feb 26, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0606-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This asynchronous patch is a security update for the wildfly-security-manager package in Red Hat JBoss Enterprise Application Platform 7.2. HTTP request smuggling was addressed along with other security issues.

tags | advisory, java, web
systems | linux, redhat
advisories | CVE-2020-7238
MD5 | 6273d92669b5e246eaae05f170b14af0
Red Hat Security Advisory 2020-0602-01
Posted Feb 26, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0602-01 - Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. HTTP request smuggling was addressed along with other security issues.

tags | advisory, web, javascript
systems | linux, redhat
advisories | CVE-2019-15604, CVE-2019-15605, CVE-2019-15606, CVE-2019-16775, CVE-2019-16776, CVE-2019-16777
MD5 | 445a7f3e9ec4f4ee4b72eb47564f98ed
AVAST Generic Archive Bypass
Posted Feb 26, 2020
Authored by Thierry Zoller

The AVAST parsing engine supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating a ZIP archive so that it can be accessed by an end-user but not the anti-virus software. The AV engine is unable to scan the container and gives the file a "clean" rating.

tags | advisory, virus
advisories | CVE-2020-9399
MD5 | 2a5619ab4bba5b0d39515674edc6e6b1
Easy2Pilot 8 SQL Injection / Cross Site Request Forgery
Posted Feb 26, 2020
Authored by indoushka

Easy2Pilot version 8 suffers from remote SQL injection, backdoor account, and cross site request forgery vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, csrf
MD5 | 3dc823fa20db6c112729bef3639ba903
Red Hat Security Advisory 2020-0601-01
Posted Feb 26, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0601-01 - Red Hat AMQ Clients enable connecting, sending, and receiving messages over the AMQP 1.0 wire transport protocol to or from AMQ Broker 6 and 7. This update provides various bug fixes and enhancements in addition to the client package versions previously released on Red Hat Enterprise Linux 6, 7, and 8.

tags | advisory, protocol
systems | linux, redhat
advisories | CVE-2019-20444, CVE-2019-20445, CVE-2020-7238
MD5 | 584a6024fe9caf6105d3299d3011c0e8
DirectWeb 0.4.0 Cross Site Scripting
Posted Feb 26, 2020
Authored by indoushka

DirectWeb version 0.4.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 12744d97d61c59fcdfc5925361500927
Cacti 1.2.8 Authenticated Remote Code Execution
Posted Feb 26, 2020
Authored by Askar

Cacti version 1.2.8 suffers from an authenticated remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2020-8813
MD5 | 3131b5c154b2f3713e2859a12a1e81ad
Cacti 1.2.8 Unauthenticated Remote Code Execution
Posted Feb 26, 2020
Authored by Askar

Cacti version 1.2.8 suffers from an unauthenticated remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2020-8813
MD5 | e7532209471bf71937075692ec45d1c0
Page 1 of 1
Back1Next

File Archive:

August 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    3 Files
  • 2
    Aug 2nd
    2 Files
  • 3
    Aug 3rd
    32 Files
  • 4
    Aug 4th
    22 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    19 Files
  • 7
    Aug 7th
    6 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close