exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 28 RSS Feed

Files Date: 2020-11-11

Ubuntu Security Notice USN-4622-2
Posted Nov 11, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4622-2 - USN-4622-1 fixed a vulnerability in OpenLDAP. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. It was discovered that OpenLDAP incorrectly handled certain network packets. A remote attacker could use this issue to cause OpenLDAP to crash, resulting in a denial of service, or possibly execute arbitrary code. Various other issues were also addressed.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2020-25692
SHA-256 | 4b076f92917b55b8e6b13785852b197b8f0c78402f6918af5d3012681e9c32f0
Ubuntu Security Notice USN-4630-1
Posted Nov 11, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4630-1 - Hanno Boeck discovered that Raptor incorrectly handled certain memory operations. If a user were tricked into opening a specially crafted document in an application linked against Raptor, an attacker could cause the application to crash, resulting in a denial of service, or possibly execute arbitrary code.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2017-18926
SHA-256 | ba4b2429461eb8d684ebc279cf9e14a67389506861773ebb0ad900b8281137f9
Ubuntu Security Notice USN-4629-1
Posted Nov 11, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4629-1 - Michael Chapman discovered that MoinMoin incorrectly handled certain cache actions. An attacker could possibly use this issue to execute arbitrary code. Catarina Leite discovered that MoinMoin incorrectly handled certain SVG files. An attacker could possibly use this issue to execute arbitrary code.

tags | advisory, arbitrary
systems | linux, ubuntu
advisories | CVE-2020-15275, CVE-2020-25074
SHA-256 | 6a94bca2d157fa53ce20f3267659c1f8775fc53a3a5bb8aff7b365d10d7a1283
nfstream 6.2.2
Posted Nov 11, 2020
Authored by Zied Aouini | Site github.com

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

Changes: Added a patch fixing anonymization on user-defined plugins.
tags | tool, python
systems | unix
SHA-256 | 9cc19b959142f78e2035d4131c1db432e2baa42ed9cf928b82aa0658b026f5a3
Microsoft Windows Local Spooler Bypass
Posted Nov 11, 2020
Authored by James Forshaw, Google Security Research

Microsoft Windows suffers from a local spooler bypass vulnerability.

tags | exploit, local, bypass
systems | windows
advisories | CVE-2020-1337, CVE-2020-17001
SHA-256 | 61c3a397ee51f0006b58ad2f59a3812935b74612177c4a79db2bb0053572084d
No cON Name 2020 Online Edition Call For Papers
Posted Nov 11, 2020
Authored by No cON CFP | Site noconname.org

Call For Papers for the No cON Name 2020 conference. It will be held online December 18th through the 20th, 2020.

tags | paper, conference
SHA-256 | 258d7354f7e434b02414550ee6297dcb990eafcdfc13e3f9c2f1d1c9c0384bc2
Customer Support System 1.0 Cross Site Scripting
Posted Nov 11, 2020
Authored by Ahmed Abbas

Customer Support System version 1.0 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | ca580474c4352a83ccf836e4c821b28a3d68feeae7b03c42d7fdc81b1152616c
Customer Support System 1.0 Cross Site Request Forgery
Posted Nov 11, 2020
Authored by Ahmed Abbas

Customer Support System version 1.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 39eebd3c8d49cf61712b725a7d80c7b5f0c4c8ab2185d9d0745408abb2aeeca6
Customer Support System 1.0 SQL Injection
Posted Nov 11, 2020
Authored by Ahmed Abbas

Customer Support System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | a0e28fc74e96b490350e9e6a49dc13c4778cbfcc47f431076847ac79e42185fc
Red Hat Security Advisory 2020-5086-01
Posted Nov 11, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-5086-01 - Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Issues addressed include HTTP request smuggling and buffer overflow vulnerabilities.

tags | advisory, web, overflow, javascript, vulnerability
systems | linux, redhat
advisories | CVE-2020-15095, CVE-2020-8116, CVE-2020-8201, CVE-2020-8252
SHA-256 | 51a4d744605ca328594e02d8bd9ebbb530a2ad8fdd07fc010928825fae10d7db
Red Hat Security Advisory 2020-5083-01
Posted Nov 11, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-5083-01 - An update for microcode_ctl is now available for Red Hat Enterprise Linux 7. Issues addressed include an information leakage vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-8695, CVE-2020-8696, CVE-2020-8698
SHA-256 | 42190c7282f4c658e06279bcc5b86c128045392c4b64b9bcd37543f7b7328eba
Red Hat Security Advisory 2020-5084-01
Posted Nov 11, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-5084-01 - An update for microcode_ctl is now available for Red Hat Enterprise Linux 6.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-8696, CVE-2020-8698
SHA-256 | 810df6007af8640bf65333e5350e4d25a7d78d5c22eaafd4e927d85cf5d7dc9d
Red Hat Security Advisory 2020-5085-01
Posted Nov 11, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-5085-01 - An update for microcode_ctl is now available for Red Hat Enterprise Linux 8. Issues addressed include an information leakage vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-8695, CVE-2020-8696, CVE-2020-8698
SHA-256 | 9a41119a77130e5b108d0b2682cd5c7897e78cb3f0df6c5b2a2531237f2746a0
Ubuntu Security Notice USN-4628-1
Posted Nov 11, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4628-1 - Moritz Lipp, Michael Schwarz, Andreas Kogler, David Oswald, Catherine Easdon, Claudio Canella, and Daniel Gruss discovered that the Intel Running Average Power Limit feature of some Intel processors allowed a side- channel attack based on power consumption measurements. A local attacker could possibly use this to expose sensitive information. Ezra Caltum, Joseph Nuzman, Nir Shildan and Ofir Joseff discovered that some Intel Processors did not properly remove sensitive information before storage or transfer in some situations. A local attacker could possibly use this to expose sensitive information. Various other issues were also addressed.

tags | advisory, local
systems | linux, ubuntu
advisories | CVE-2020-8695, CVE-2020-8696, CVE-2020-8698
SHA-256 | ac81944641dddf11488a9bdf22af1912f755f581de876af8741696bae832e3fa
Gentoo Linux Security Advisory 202011-14
Posted Nov 11, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202011-14 - A vulnerability has been discovered in MariaDB which could result in the arbitrary execution of code. Versions less than 10.5.6 are affected.

tags | advisory, arbitrary
systems | linux, gentoo
advisories | CVE-2020-15180
SHA-256 | e8964319575a5fd75c91c70fed1bb5d7380caf7d6c3bb395749bf42168c34776
Gentoo Linux Security Advisory 202011-13
Posted Nov 11, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202011-13 - Multiple vulnerabilities have been found in Salt, the worst of which could result in the arbitrary execution of code. Versions less than 3000.5 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2020-16846, CVE-2020-17490, CVE-2020-25592
SHA-256 | abb5e03a5ec887de7abc41bf6db230426d3a812179a8d18df5eca701d9593ba9
Gentoo Linux Security Advisory 202011-12
Posted Nov 11, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202011-12 - Multiple vulnerabilities have been found in Chromium and Google Chrome, the worst of which could result in the arbitrary execution of code. Versions less than 86.0.4240.193 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2020-15999, CVE-2020-16004, CVE-2020-16005, CVE-2020-16006, CVE-2020-16008, CVE-2020-16009, CVE-2020-16016
SHA-256 | a9b46f9ccc5ada73083a35dfb54fe083fb56da19b0176cde5ff2317d560ecdb4
Gentoo Linux Security Advisory 202011-11
Posted Nov 11, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202011-11 - A privilege escalation vulnerability has been discovered in Blueman. Versions less than 2.1.4 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2020-15238
SHA-256 | d1a319518d23072df82ddb23e7ac8498b8ce75a7ced766173d542640e3bbaadc
Gentoo Linux Security Advisory 202011-10
Posted Nov 11, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202011-10 - A buffer overflow in tmux might allow remote attacker(s) to execute arbitrary code. Versions less than 3.1c are affected.

tags | advisory, remote, overflow, arbitrary
systems | linux, gentoo
advisories | CVE-2020-27347
SHA-256 | 3a64db7c5da2c31d810955dbc3a511942efbc0c651b4fcf238e960d1eeef51f0
Gentoo Linux Security Advisory 202011-09
Posted Nov 11, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202011-9 - Multiple vulnerabilities have been found in QEMU, the worst of which could result in the arbitrary execution of code. Versions less than 5.1.0-r1 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2020-10717, CVE-2020-10761, CVE-2020-13253, CVE-2020-13361, CVE-2020-13362, CVE-2020-13659, CVE-2020-13754, CVE-2020-13791, CVE-2020-13800, CVE-2020-14364
SHA-256 | 5d95ad52fc75012ed91b82e53b3043a7867fe90adef97e5fe61a56d75c7075b6
Gentoo Linux Security Advisory 202011-08
Posted Nov 11, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202011-8 - Multiple vulnerabilities have been found in Wireshark, the worst of which could result in a Denial of Service condition. Versions less than 3.4.0 are affected.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
advisories | CVE-2020-26575
SHA-256 | d95126e43cf4f2925a9ca199805ec8d7701fcb53532187933665015aabaa5283
Gentoo Linux Security Advisory 202011-07
Posted Nov 11, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202011-7 - A use-after-free in Mozilla Firefox might allow remote attacker(s) to execute arbitrary code. Versions less than 82.0.3 are affected.

tags | advisory, remote, arbitrary
systems | linux, gentoo
advisories | CVE-2020-26950
SHA-256 | 4b1912ff8b58ae3cf8446bb5011eb79c7f84492c870faefdbcf52fd29fa26f61
Ubuntu Security Notice USN-4627-1
Posted Nov 11, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4627-1 - Moritz Lipp, Michael Schwarz, Andreas Kogler, David Oswald, Catherine Easdon, Claudio Canella, and Daniel Gruss discovered that the Intel Running Average Power Limit driver in the Linux kernel did not properly restrict access to power data. A local attacker could possibly use this to expose sensitive information.

tags | advisory, kernel, local
systems | linux, ubuntu
advisories | CVE-2020-8694
SHA-256 | 227bbb50540c4cabb720611110526d2fb41ccd194cad0f53df0c5ba196ab8ca2
Ubuntu Security Notice USN-4626-1
Posted Nov 11, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4626-1 - Simon Scannell discovered that the bpf verifier in the Linux kernel did not properly calculate register bounds for certain operations. A local attacker could use this to expose sensitive information or gain administrative privileges. Moritz Lipp, Michael Schwarz, Andreas Kogler, David Oswald, Catherine Easdon, Claudio Canella, and Daniel Gruss discovered that the Intel Running Average Power Limit driver in the Linux kernel did not properly restrict access to power data. A local attacker could possibly use this to expose sensitive information. Various other issues were also addressed.

tags | advisory, kernel, local
systems | linux, ubuntu
advisories | CVE-2020-27194, CVE-2020-8694
SHA-256 | da25d2442e323c1c467af193e2d689c49f1e62e8fb167128f9827485fabcdb89
Red Hat Security Advisory 2020-5079-01
Posted Nov 11, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-5079-01 - The kernel-alt packages provide the Linux kernel version 4.x. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service, kernel
systems | linux, redhat
advisories | CVE-2020-25641
SHA-256 | 7c9ef1548ac41342b416f02ddc9fc09baced0e913efd0d26756e653636915787
Page 1 of 2
Back12Next

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    17 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close