exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 2020-05-15

TOR Virtual Network Tunneling Tool 0.4.3.5
Posted May 15, 2020
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: Tor 0.4.3.5 is the first stable release in the 0.4.3.x series. This series adds support for building without relay code enabled, and implements functionality needed for OnionBalance with v3 onion services. It includes significant refactoring of our configuration and controller functionality, and fixes numerous smaller bugs and performance issues.
tags | tool, remote, local, peer2peer
systems | unix
SHA-256 | 616a0e4ae688d0e151d46e3e4258565da4d443d1ddbd316db0b90910e2d5d868
ManageEngine AssetExplorer Authenticated Command Execution
Posted May 15, 2020
Authored by Sahil Dhar, xen1thLabs

ManageEngine AssetExplorer versions prior to 6.5 (6503) suffer from an authenticated remote command execution vulnerability.

tags | exploit, remote
advisories | CVE-2019-19034
SHA-256 | 78e2dfe15fe4ac8812878531114733d90bacff83962512be4ff408289bef63d6
Microsoft Windows Task Scheduler Security Feature Bypass
Posted May 15, 2020
Authored by Sylvain Heiniger

Compass Security identified a security feature bypass vulnerability in Microsoft Windows. Due to the absence of integrity verification requirements for the RPC protocol and in particular the Task Scheduler, a man-in-the-middle attacker can relay his victim's NTLM authentication to a target of his choice over the RPC protocol. Provided the victim has administrative privileges on the target, the attacker can execute code on the remote target.

tags | exploit, remote, protocol, bypass
systems | windows
advisories | CVE-2020-1113
SHA-256 | 16fcf81541831c6f1a2109c00a1d366d79871db6b8aecafaba474512db27d1b8
Ubuntu Security Notice USN-4360-3
Posted May 15, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4360-3 - USN-4360-1 fixed a vulnerability in json-c. The security fix introduced a memory leak in some scenarios. This update reverts the security fix pending further investigation. It was discovered that json-c incorrectly handled certain JSON files. An attacker could possibly use this issue to execute arbitrary code. Various other issues were also addressed.

tags | advisory, arbitrary, memory leak
systems | linux, ubuntu
SHA-256 | c84b4fa79a09511a77239456c6c9d7e8230e9d6b28da09f314a8b822e41740b5
Ubuntu Security Notice USN-4360-2
Posted May 15, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4360-2 - USN-4360-1 fixed a vulnerability in json-c. The security fix introduced a memory leak in some scenarios. This update reverts the security fix pending further investigation. It was discovered that json-c incorrectly handled certain JSON files. An attacker could possibly use this issue to execute arbitrary code. Various other issues were also addressed.

tags | advisory, arbitrary, memory leak
systems | linux, ubuntu
SHA-256 | 1366fa1cab3bfb43a300c29d0ae22c498182a5143e34811ae9f4211fb6c8a264
ACal 2.2.6 Remote Code Execution
Posted May 15, 2020
Authored by Bobby Cooke

ACal version 2.2.6 suffers from a one-click remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | b32ebcce27b52719f4cf51ee40137cc6d13cbab93a57f639a9f947d5d9d8ddf0
Gentoo Linux Security Advisory 202005-13
Posted May 15, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202005-13 - Multiple vulnerabilities have been found in Chromium and Google Chrome, the worst of which could result in the arbitrary execution of code. Versions less than 81.0.4044.138 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2020-6461, CVE-2020-6462, CVE-2020-6464
SHA-256 | 4ad238269babd468d2efbc484d0d8f5c37e3ada63292c109f8d6592f148db129
Gentoo Linux Security Advisory 202005-12
Posted May 15, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202005-12 - Multiple vulnerabilities have been found in OpenSLP, the worst of which could result in the arbitrary execution of code. Versions less than or equal to 2.0.0-r5 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2017-17833, CVE-2019-5544
SHA-256 | 556ed88a88673e3ae306f769029cc5879baf1584d96d1dc5596110e415cbfb52
Gentoo Linux Security Advisory 202005-11
Posted May 15, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202005-11 - A buffer overflow in VLC might allow local or remote attacker(s) to execute arbitrary code. Versions less than 3.0.10 are affected.

tags | advisory, remote, overflow, arbitrary, local
systems | linux, gentoo
advisories | CVE-2019-19721
SHA-256 | 7278d1f2b0dccd639213114dd7db125b1986e067140664c35f39af5fa948f45a
Gentoo Linux Security Advisory 202005-10
Posted May 15, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202005-10 - Multiple vulnerabilities have been found in libmicrodns, the worst of which could result in the arbitrary execution of code. Versions less than 0.1.2 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2020-6071, CVE-2020-6072, CVE-2020-6073, CVE-2020-6077, CVE-2020-6078, CVE-2020-6079, CVE-2020-6080
SHA-256 | 66c281f96d26b266f316a42a4d0d4eee8789cb50241c96fcbd5f7d23c993d110
Gentoo Linux Security Advisory 202005-09
Posted May 15, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202005-9 - A vulnerability in Python could lead to a Denial of Service condition. Versions less than 2.7.18:2.7 are affected.

tags | advisory, denial of service, python
systems | linux, gentoo
advisories | CVE-2020-8492
SHA-256 | 2d7f5b8342ce35b98f6e8586a81331d05e7437a9e67b4693d40ce2f035b09707
Gentoo Linux Security Advisory 202005-08
Posted May 15, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202005-8 - Multiple vulnerabilities have been found in Xen, the worst of which could allow privilege escalation. Versions less than 4.12.2-r2 are affected.

tags | advisory, vulnerability
systems | linux, gentoo
advisories | CVE-2020-11739, CVE-2020-11740, CVE-2020-11741, CVE-2020-11742, CVE-2020-11743
SHA-256 | 8ba00f32c4e9e8000a32d7371e9e6a65e8aad643c362364438ff870a9a4f70d0
Gentoo Linux Security Advisory 202005-07
Posted May 15, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202005-7 - Multiple vulnerabilities have been found in FreeRDP, the worst of which could result in a Denial of Service condition. Versions less than 2.1.0 are affected.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
advisories | CVE-2019-17177, CVE-2020-11521, CVE-2020-11522, CVE-2020-11523, CVE-2020-11524, CVE-2020-11525, CVE-2020-11526
SHA-256 | 227933ffe1a534a462d85ef16f4a0a62cb25e725bbda1e13d8c443003acca4db
Gentoo Linux Security Advisory 202005-06
Posted May 15, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202005-6 - Multiple vulnerabilities have been found in LIVE555 Media Server, the worst of which could result in the arbitrary execution of code. Versions less than 2020.03.06 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2018-4013, CVE-2019-15232, CVE-2019-6256, CVE-2019-7314, CVE-2019-7733, CVE-2019-9215
SHA-256 | 529f6554764bdfa0755547d1ea417bd9b760f1aba7ecd493ca46b305f32e8e44
SecureCRT Memory Corruption
Posted May 15, 2020
Authored by Tavis Ormandy, Google Security Research

SecureCRT suffers from a memory corruption vulnerability in CSI functions.

tags | exploit
advisories | CVE-2020-12651
SHA-256 | e059a439c55289e0f1a5019136f7bbd0d69fc1efd9b8d3c24ced68d1c3f9d004
ManageEngine Service Desk 10.0 Cross Site Scripting
Posted May 15, 2020
Authored by Felipe Molina

ManageEngine Service Desk version 10.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2019-15083
SHA-256 | 469e92a043840addd4c43d4eb114c7ef988c00069a831c8b52bc518e495ec1e9
vBulletin 5.6.1 SQL Injection
Posted May 15, 2020
Authored by Photubias

vBulletin version 5.6.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2020-12720
SHA-256 | e9bdd1a9c7ac4c698df1254cb099a495abfb2879f7affcf386aead86ed8ab655
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close