what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 289 RSS Feed

Files Date: 2019-12-01 to 2019-12-31

AVE DOMINAplus 1.10.x Credential Disclosure
Posted Dec 27, 2019
Authored by LiquidWorm | Site zeroscience.mk

AVE DOMINAplus versions 1.10.x and below suffer from a credential disclosure vulnerability.

tags | exploit
SHA-256 | fb23f97bb7a796b24603f52ab2b6237866cb0d5e5d1fcbe46e9cb2975bf4d6cd
AVE DOMINAplus 1.10.x Authentication Bypass
Posted Dec 27, 2019
Authored by LiquidWorm | Site zeroscience.mk

AVE DOMINAplus versions 1.10.x and below suffer from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | f4c090245182d4f6d5c066262ce9a85e46956fbae937da321ffabb01e83bb924
AVE DOMINAplus 1.10.x Unauthenticated Remote Reboot
Posted Dec 27, 2019
Authored by LiquidWorm | Site zeroscience.mk

AVE DOMINAplus versions 1.10.x and below suffer from an unauthenticated remote reboot vulnerability.

tags | exploit, remote
SHA-256 | a9ed27231fe14524b9a83ea6aec6bd283fc0d8952d4f7d92cb016a614a545fbf
AVE DOMINAplus 1.10.x Cross Site Request Forgery / Cross Site Scripting
Posted Dec 27, 2019
Authored by LiquidWorm | Site zeroscience.mk

AVE DOMINAplus versions 1.10.x and below suffer from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 6dbdb199228eb07a4d22d2601beb616d58332dc982ea7ad25070d0a60cc50f85
Debian Security Advisory 4593-1
Posted Dec 27, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4593-1 - It was found that freeimage, a graphics library, was affected by the heap buffer overflow and stack exhaustion vulnerabilities.

tags | advisory, overflow, vulnerability
systems | linux, debian
advisories | CVE-2019-12211, CVE-2019-12213
SHA-256 | 4ebdd4858626576870687736dfb6bbf6dc59bf2ac9dcf517ef5a2dd786183e7b
Debian Security Advisory 4592-1
Posted Dec 27, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4592-1 - It was discovered that the Title blacklist functionality in MediaWiki, a website engine for collaborative work, could by bypassed.

tags | advisory
systems | linux, debian
advisories | CVE-2019-19709
SHA-256 | bb20c7cf79bcabae820f69665eb8d16f0f0eb6ff267718a901d2578df8890394
Microsoft Exchange Server External Service Interaction
Posted Dec 27, 2019
Authored by Alphan Yavas

Microsoft Exchange Server 2013 CU22 and previous versions suffer from an external service interaction issue.

tags | exploit
SHA-256 | 97ae1cdfb14b6b4713dcecd41c04b196d03d7a204cae20790fa60f8db0e26eaa
Debian Security Advisory 4591-1
Posted Dec 26, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4591-1 - Stephan Zeisberg reported an out-of-bounds write vulnerability in the _sasl_add_string() function in cyrus-sasl2, a library implementing the Simple Authentication and Security Layer. A remote attacker can take advantage of this issue to cause denial-of-service conditions for applications using the library.

tags | advisory, remote
systems | linux, debian
advisories | CVE-2019-19906
SHA-256 | 4db92c809e74e626ad26cbe38cd7f796e781962de618ac889bc9c491e03a3624
Slackware Security Advisory - tigervnc Updates
Posted Dec 26, 2019
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New tigervnc packages are available for Slackware 14.2 and -current to fix security issues.

tags | advisory
systems | linux, slackware
SHA-256 | 3761322629c9c5cd98ffac11bc9c7d21c77149de443b8fc3a1a74626a8aca9e2
Slackware Security Advisory - openssl Updates
Posted Dec 26, 2019
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New openssl packages are available for Slackware 14.2 and -current to fix a security issue.

tags | advisory
systems | linux, slackware
advisories | CVE-2019-1551
SHA-256 | ac183b8e752e5f00b1fc5cc6180eb2594a11d4d02915f3992ca665a26a46e860
Domain Quester Pro 6.02 Stack Overflow
Posted Dec 26, 2019
Authored by Bobby Cooke

Domain Quester Pro version 6.02 suffers from a stack overflow vulnerability.

tags | exploit, overflow
SHA-256 | 73039072ad383a4d73b3992138c7fcd16c858b30ebd3ef28e5287f2590cb2c90
RICOH Web Image Monitor 1.09 HTML Injection
Posted Dec 26, 2019
Authored by Ismail Tasdelen

RICOH Web Image Monitor version 1.09 suffers from an html injection vulnerability.

tags | exploit, web
SHA-256 | 8180640735b664e85f8a594c65145568ddb2f0c241577fe3aa04fc5bf43cfb49
Heatmiser Netmonitor 3.03 HTML Injection
Posted Dec 26, 2019
Authored by Ismail Tasdelen

Heatmiser Netmonitor version 3.03 suffers from an html injection vulnerability.

tags | exploit
SHA-256 | d7b591bcf03744af35693fba3356137a4e003ba42419844a9812bbe7f8bc480d
XEROX WorkCentre 6655 Printer Cross Site Request Forgery
Posted Dec 26, 2019
Authored by Ismail Tasdelen

XEROX WorkCentre 6655 Printer suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | d5f3095808c02e6ca61f02cd21215c35e1a9f78fc566355963fa1e13d8ebbe86
XEROX WorkCentre 7855 Printer Cross Site Request Forgery
Posted Dec 26, 2019
Authored by Ismail Tasdelen

XEROX WorkCentre 7855 Printer suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 77612bad456f1d37fe3057a6a4ecdc4f10cb1375b19fd8806b790dfe3624e621
XEROX WorkCentre 7830 Printer Cross Site Request Forgery
Posted Dec 26, 2019
Authored by Ismail Tasdelen

XEROX WorkCentre 7830 Printer suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 722ddad24a74446b88461671c5e4dc983e78cbc0412958c4505fc5c3cd41415a
Linux/x86 Encoder / Decoder Shellcode
Posted Dec 26, 2019
Authored by Xenofon Vassilakopoulos

117 bytes small Linux/x86 encoding of random bytes + XOR/SUB/NOT/ROR and also decodes ROL/NOT/ADD/XOR execve(/bin/sh) shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | b82dfb8d4d91af3595f567041ee05b15504b8214cc59b1d265373db0258eb1ba
Bypassing A Null Byte POP/POP/RET Sequence
Posted Dec 25, 2019
Authored by FULLSHADE

This whitepaper covers a new technique that utilizes DLL injection to inject a custom DLL into a running vulnerable process to add a POP POP RET sequence in the scenario that the vulnerable program does not include any null byte free sequences. This is a useful technique to exploit SEH buffer overflow attacks successfully.

tags | paper, overflow
SHA-256 | 74df8ee5ae7f9410a55a3ced1546454f896ed3cdd356c8ffd56a51dee01fc0db
CA Client Automation 14.x Privilege Escalation
Posted Dec 25, 2019
Authored by Kevin Kotas, Andrew Hess | Site www3.ca.com

A vulnerability exists in CA Client Automation that can allow a local attacker to gain escalated privileges. CA published solutions to address the vulnerability and recommends that all affected customers implement the applicable solution. The vulnerability, CVE-2019-19231, occurs due to insecure file access by the agent services. A local attacker may exploit this vulnerability to execute arbitrary commands with escalated privileges on an installation of the Client Automation agent. The Windows agent in CA Client Automation versions 14.0, 14.1, 14.2, and 14.3 are affected.

tags | advisory, arbitrary, local
systems | windows
advisories | CVE-2019-19231
SHA-256 | f83b28b09c7c76554eda487fcb8f48e6c31754eb1815d5deca6571ca3cc74d47
Prime95 29.8 Build 6 Buffer Overflow
Posted Dec 24, 2019
Authored by Achilles

Prime95 version 29.8 build 6 SEH buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 40e427bd212ab4a7abfeab0080a1cb64d1d519cd8464b3d962d69e93abc61d4c
Reptile Rootkit reptile_cmd Privilege Escalation
Posted Dec 23, 2019
Authored by Brendan Coles, f0rb1dd3n | Site metasploit.com

This Metasploit module uses Reptile rootkit's reptile_cmd backdoor executable to gain root privileges using the root command. This module has been tested successfully with Reptile from master branch (2019-03-04) on Ubuntu 18.04.3 (x64) and Linux Mint 19 (x64).

tags | exploit, root
systems | linux, ubuntu
SHA-256 | 8186f5f11335f41fb98ec8db0d3d1fb55357e44c311a504e72b4a26781481cf4
vReliable Datagram Sockets (RDS) rds_page_copy_user Privilege Escalation
Posted Dec 23, 2019
Authored by Dan Rosenberg, Brendan Coles | Site metasploit.com

This Metasploit module exploits a vulnerability in the rds_page_copy_user function in net/rds/page.c (RDS) in Linux kernel versions 2.6.30 to 2.6.36-rc8 to execute code as root (CVE-2010-3904). This module has been tested successfully on Fedora 13 (i686) kernel version 2.6.33.3-85.fc13.i686.PAE and Ubuntu 10.04 (x86_64) with kernel version 2.6.32-21-generic.

tags | exploit, kernel, root
systems | linux, fedora, ubuntu
advisories | CVE-2010-3904
SHA-256 | bc46d127784cc25a8eebe3568a7dc33efb953a22d3a6de8a44f9394b892ee0c6
Red Hat Security Advisory 2019-4361-01
Posted Dec 23, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-4361-01 - A library to handle bidirectional scripts, so that the display is done in the proper way, while the text data itself is always written in logical order. Issues addressed include buffer overflow, code execution, and denial of service vulnerabilities.

tags | advisory, denial of service, overflow, vulnerability, code execution
systems | linux, redhat
advisories | CVE-2019-18397
SHA-256 | 8fb50e20295bd9ecc4cbcc8d48352c1e7358fa6fbaaf0d25dbdbee7024c335c5
Red Hat Security Advisory 2019-4360-01
Posted Dec 23, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-4360-01 - The libyang package provides a library for YANG data modeling language. libyang is a YANG data modelling language parser and toolkit written in C. The library is used e.g. in libnetconf2, Netopeer2, sysrepo and FRRouting projects. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow
systems | linux, redhat
advisories | CVE-2019-19333, CVE-2019-19334
SHA-256 | be3166a5b5988a969e5b240bb3ab3ef561a9e2a0ed082e45d7449b9601d02f95
FreeSWITCH 1.10.1 Command Execution
Posted Dec 22, 2019
Authored by 1F98D

FreeSWITCH version 1.10.1 suffers from a command execution vulnerability.

tags | exploit
SHA-256 | cf5fac441e8fe1dc7aaac84e56a66ed60a726d5a5793daf6ad13450b79035913
Page 2 of 12
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close