exploit the possibilities
Showing 1 - 25 of 27 RSS Feed

Files Date: 2020-08-10

Zeek 3.2.0
Posted Aug 10, 2020
Authored by Robin Sommer, Vern Paxson | Site zeek.org

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.

Changes: Zeek now caches certificates if they have (by default) been encountered more than 10 times in 62 seconds. Add parsing support for Remote Desktop Protocol UDP Transport Extension (RDPEUDP versions 1 and 2).
tags | tool, intrusion detection
systems | unix
MD5 | 4bae25bd4e01037d36d2f2cbd5b1b24b
Ubuntu Security Notice USN-4454-2
Posted Aug 10, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4454-2 - USN-4454-1 fixed a vulnerability in Samba. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. Martin von Wittich and Wilko Meyer discovered that Samba incorrectly handled certain empty UDP packets when being used as a AD DC NBT server. A remote attacker could possibly use this issue to cause Samba to crash, resulting in a denial of service. Various other issues were also addressed.

tags | advisory, remote, denial of service, udp
systems | linux, ubuntu
advisories | CVE-2020-14303
MD5 | 28286858828b581194abde5675e0a025
Ubuntu Security Notice USN-4455-1
Posted Aug 10, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4455-1 - It was discovered that NSS incorrectly handled certain signatures. An attacker could possibly use this issue to expose sensitive information.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2020-12400
MD5 | 2f3a49b001cc039e26024aa57b1ee4ad
Red Hat Security Advisory 2020-3387-01
Posted Aug 10, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3387-01 - IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 7 to version 7R1 SR4-FP70. Issues addressed include bypass and information leakage vulnerabilities.

tags | advisory, java, vulnerability
systems | linux, redhat
advisories | CVE-2019-17639, CVE-2020-14577, CVE-2020-14578, CVE-2020-14579, CVE-2020-14583, CVE-2020-14593, CVE-2020-14621, CVE-2020-2590, CVE-2020-2601
MD5 | e0690190a36f7705b60c7f221e2e4c0d
Red Hat Security Advisory 2020-3388-01
Posted Aug 10, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3388-01 - IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 7 to version 7R1 SR4-FP70. Issues addressed include bypass and information leakage vulnerabilities.

tags | advisory, java, vulnerability
systems | linux, redhat
advisories | CVE-2019-17639, CVE-2020-14577, CVE-2020-14578, CVE-2020-14579, CVE-2020-14583, CVE-2020-14593, CVE-2020-14621, CVE-2020-2590, CVE-2020-2601
MD5 | 53ee4b1289ef46a3e9115422b79ee9b8
Ubuntu Security Notice USN-4454-1
Posted Aug 10, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4454-1 - Martin von Wittich and Wilko Meyer discovered that Samba incorrectly handled certain empty UDP packets when being used as a AD DC NBT server. A remote attacker could possibly use this issue to cause Samba to crash, resulting in a denial of service.

tags | advisory, remote, denial of service, udp
systems | linux, ubuntu
advisories | CVE-2020-14303
MD5 | 4d727511174b362f017cea4d57f55db7
ManageEngine ADSelfService Plus 6000 Remote Code Execution
Posted Aug 10, 2020
Authored by Bhadresh Patel

ManageEngine ADSelfService Plus 6000 unauthenticated remote code execution exploit.

tags | exploit, remote, code execution
advisories | CVE-2020-11552
MD5 | 0261c2ef1439e755fd4c0111baa4b914
Cisco 7937G Denial Of Service
Posted Aug 10, 2020
Authored by Cody Martin

Two denial of service exploits for Cisco 7937G versions SIP-1-4-5-7 and below.

tags | exploit, denial of service
systems | cisco
advisories | CVE-2020-16138, CVE-2020-16139
MD5 | 5534c1f0e1f875aee45b3734baba6fdb
Cisco 7937G Privilege Escalation
Posted Aug 10, 2020
Authored by Cody Martin

Cisco 7947G versions SIP-1-4-5-7 and below privilege escalation exploit.

tags | exploit
systems | cisco
advisories | CVE-2020-16137
MD5 | 50b203b494ce1d079936d6dbb4a3f309
Cisco 7937G All-In-One Exploiter
Posted Aug 10, 2020
Authored by Cody Martin

This exploit is an all-in-one tool that leverages vulnerabilities described in CVE-2020-16139, CVE-2020-16138, and CVE-2020-16137 against Cisco 7937G devices versions SIP-1-4-5-7 and below.

tags | exploit, vulnerability
systems | cisco
advisories | CVE-2020-16137, CVE-2020-16138, CVE-2020-16139
MD5 | 9eb60ef20d0f3abf883446a0c58b2d27
Red Hat Security Advisory 2020-3386-01
Posted Aug 10, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3386-01 - IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 8 to version 8 SR6-FP15. Issues addressed include bypass and information leakage vulnerabilities.

tags | advisory, java, vulnerability
systems | linux, redhat
advisories | CVE-2019-17639, CVE-2020-14556, CVE-2020-14577, CVE-2020-14578, CVE-2020-14579, CVE-2020-14583, CVE-2020-14593, CVE-2020-14621, CVE-2020-2590, CVE-2020-2601
MD5 | 748ef1c02992345186a50a4c59e10551
Warehouse Inventory System 1.0 Cross Site Request Forgery
Posted Aug 10, 2020
Authored by Bobby Cooke, hyd3sec

Warehouse Inventory System version 1.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | 01290f1430fc0c874d2441c5bbeb39f0
Tailor MS 1.0 Cross Site Scripting
Posted Aug 10, 2020
Authored by Bobby Cooke, hyd3sec

Tailor MS version 1.0 reflected cross site scripting key logger exploit.

tags | exploit, xss
MD5 | e7c6a76445ffac2108a614abbaec5d98
BarracudaDrive 6.5 Local Privilege Escalation
Posted Aug 10, 2020
Authored by Bobby Cooke, hyd3sec

BarracudaDrive version 6.5 suffers from a privilege escalation vulnerability.

tags | exploit
MD5 | 46d297f212c73f78372745c92dba3e78
House Rental 1.0 SQL Injection
Posted Aug 10, 2020
Authored by Bobby Cooke, hyd3sec

House Rental version 1.0 SQL injection exploit that changes the administrative password. Written in python.

tags | exploit, sql injection, python
MD5 | 4835e335cf4e574990008b7767ccd72a
BarcodeOCR 19.3.6 Unquoted Service Path
Posted Aug 10, 2020
Authored by Daniel Bertoni

BarcodeOCR version 19.3.6 suffers from an unquoted service path vulnerability.

tags | exploit
MD5 | 76a9817e49286288920ad38918c7e016
Red Hat Security Advisory 2020-3385-01
Posted Aug 10, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3385-01 - LibVNCServer is a C library that enables you to implement VNC server functionality into own programs. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow
systems | linux, redhat
advisories | CVE-2017-18922
MD5 | 81cd0220bba70e36f109ac88fbf015eb
Red Hat Security Advisory 2020-3383-01
Posted Aug 10, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3383-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This asynchronous patch is an update for JBoss Enterprise Application Platform 6.4 for Red Hat Enterprise Linux 5, 6, and 7. All users of Red Hat JBoss Enterprise Application Platform 6.4 are advised to upgrade to this updated package. Issues addressed include a denial of service vulnerability.

tags | advisory, java, denial of service
systems | linux, redhat
advisories | CVE-2020-13935
MD5 | f6410d721cabef50d5751dc75362582d
Red Hat Security Advisory 2020-3382-01
Posted Aug 10, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3382-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This asynchronous patch is an update for JBoss Enterprise Application Platform 6.4. All users of Red Hat JBoss Enterprise Application Platform 6.4 are advised to upgrade to these updated packages. Issues addressed include a denial of service vulnerability.

tags | advisory, java, denial of service
systems | linux, redhat
advisories | CVE-2020-13935
MD5 | 814ef709bbaa551c16356286466e716f
Red Hat Security Advisory 2020-3379-01
Posted Aug 10, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3379-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly.

tags | advisory, protocol
systems | linux, redhat
advisories | CVE-2020-8616, CVE-2020-8617
MD5 | f91b3df8a8eebc8205c3ba022fe3d087
Red Hat Security Advisory 2020-3378-01
Posted Aug 10, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3378-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly.

tags | advisory, protocol
systems | linux, redhat
advisories | CVE-2020-8616, CVE-2020-8617
MD5 | 7ae0d56c5d06f5ca004ef35ff8a86769
Red Hat Security Advisory 2020-3377-01
Posted Aug 10, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3377-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 84.0.4147.105. Issues addressed include buffer overflow, bypass, information leakage, out of bounds write, and use-after-free vulnerabilities.

tags | advisory, web, overflow, vulnerability
systems | linux, redhat
advisories | CVE-2020-6510, CVE-2020-6511, CVE-2020-6512, CVE-2020-6513, CVE-2020-6514, CVE-2020-6515, CVE-2020-6516, CVE-2020-6517, CVE-2020-6518, CVE-2020-6519, CVE-2020-6520, CVE-2020-6521, CVE-2020-6522, CVE-2020-6523, CVE-2020-6524, CVE-2020-6525, CVE-2020-6526, CVE-2020-6527, CVE-2020-6528, CVE-2020-6529, CVE-2020-6530, CVE-2020-6531, CVE-2020-6532, CVE-2020-6533, CVE-2020-6534, CVE-2020-6535, CVE-2020-6536, CVE-2020-6537
MD5 | d4c0284575f2d5389a7e6a4a90b74ae4
Gentoo Linux Security Advisory 202008-05
Posted Aug 10, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202008-5 - A buffer overflow in gThumb might allow remote attacker(s) to execute arbitrary code. Versions less than 3.10.0 are affected.

tags | advisory, remote, overflow, arbitrary
systems | linux, gentoo
advisories | CVE-2019-20326
MD5 | 6079dfd95b3c1cbab40ba699c0ff8af7
Gentoo Linux Security Advisory 202008-06
Posted Aug 10, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202008-6 - A use-after-free was found in iproute2, possibly allowing a Denial of Service condition. Versions less than 5.1.0 are affected.

tags | advisory, denial of service
systems | linux, gentoo
advisories | CVE-2019-20795
MD5 | dd397a209e25d63bacec44e770ef754f
Gentoo Linux Security Advisory 202008-04
Posted Aug 10, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202008-4 - Multiple vulnerabilities have been found in Apache, the worst of which could result in the arbitrary execution of code. Versions less than 2.4.46 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2020-11984, CVE-2020-11985, CVE-2020-11993, CVE-2020-9490
MD5 | 6ebbbe914e5e8bb0a77e0de98171b948
Page 1 of 2
Back12Next

File Archive:

November 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    2 Files
  • 2
    Nov 2nd
    9 Files
  • 3
    Nov 3rd
    15 Files
  • 4
    Nov 4th
    90 Files
  • 5
    Nov 5th
    22 Files
  • 6
    Nov 6th
    16 Files
  • 7
    Nov 7th
    1 Files
  • 8
    Nov 8th
    1 Files
  • 9
    Nov 9th
    40 Files
  • 10
    Nov 10th
    27 Files
  • 11
    Nov 11th
    28 Files
  • 12
    Nov 12th
    13 Files
  • 13
    Nov 13th
    18 Files
  • 14
    Nov 14th
    2 Files
  • 15
    Nov 15th
    2 Files
  • 16
    Nov 16th
    29 Files
  • 17
    Nov 17th
    15 Files
  • 18
    Nov 18th
    15 Files
  • 19
    Nov 19th
    21 Files
  • 20
    Nov 20th
    16 Files
  • 21
    Nov 21st
    1 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    19 Files
  • 24
    Nov 24th
    32 Files
  • 25
    Nov 25th
    7 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close