what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 392 RSS Feed

Files Date: 2020-02-01 to 2020-02-29

Red Hat Security Advisory 2020-0633-01
Posted Feb 27, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0633-01 - The ppp packages contain the Point-to-Point Protocol daemon and documentation for PPP support. The PPP protocol provides a method for transmitting datagrams over serial point-to-point links. PPP is usually used to dial in to an Internet Service Provider or other organization over a modem and phone line. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow, protocol
systems | linux, redhat
advisories | CVE-2020-8597
SHA-256 | 1bebc5e30b3d0310766cb8db3fea8a04df5a03923396e89d78272b83466ce1de
Samsung Kernel /dev/hdcp2 hdcp_session_close() Race Condition
Posted Feb 27, 2020
Authored by Google Security Research, bazad

In the Samsung kernel, the /dev/hdcp2 device ioctls seem to implement no locking, leading to multiple exploitable race conditions. For example, you can open a session with the HDCP_IOC_SESSION_OPEN ioctl, and then close it in multiple threads in parallel with the HDCP_IOC_SESSION_CLOSE. Since no locking is implemented in hdcp_session_close(), memory will be corrupted and the system will become unstable.

tags | exploit, kernel
SHA-256 | 133fd193ed2f3352ad3d3ca59c54ca66ce35d1f5a46084a1a696a14e6b2f9edc
Samsung Kernel /dev/vipx Pointer Leak
Posted Feb 27, 2020
Authored by Google Security Research, bazad

The function __vipx_ioctl_put_container() in the Samsung kernel calls copy_to_user() on a vs4l_container_list structure that contains a kernel pointer, exposing that kernel pointer to userspace just before it gets passed to kfree().

tags | exploit, kernel
SHA-256 | cf04790c8d0e642b1910122bf8fab8586f7ff1ad7f3556e2103975c6e9559788
Red Hat Security Advisory 2020-0526-01
Posted Feb 27, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0526-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. An issue where /etc/passwd was given incorrect privileges has been addressed.

tags | advisory
systems | linux, redhat
advisories | CVE-2019-19351
SHA-256 | 030dfcd72c32febf0856e4985978ffee94a07f992a7660e011101237be46f09b
Red Hat Security Advisory 2020-0630-01
Posted Feb 27, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0630-01 - The ppp packages contain the Point-to-Point Protocol daemon and documentation for PPP support. The PPP protocol provides a method for transmitting datagrams over serial point-to-point links. PPP is usually used to dial in to an Internet Service Provider or other organization over a modem and phone line. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow, protocol
systems | linux, redhat
advisories | CVE-2020-8597
SHA-256 | 2cafd3c642092b4ba0ba572a8f7bad662501dca79332e06a608bd62708e0a721
Comtrend VR-3033 Command Injection
Posted Feb 27, 2020
Authored by Raki Ben Hamouda

Comtrend VR-3033 suffers from a command injection vulnerability.

tags | exploit
SHA-256 | 144d230fc575963771df80953220dd09c869bfb784d07d198dcc03ca718353e2
PHP-Fusion CMS 9.03 Cross Site Scripting
Posted Feb 26, 2020
Authored by R. Jaafar, S. Maskan, W. Ikram, M. Ali, N. Ramadhan | Site sec-consult.com

PHP-Fusion CMS versions 9 through 9.03 suffer from multiple cross site scripting vulnerabilities.

tags | exploit, php, vulnerability, xss
SHA-256 | 30ba65e62713fe6095418decd4abb733bd8f2877feb82c9d1595e96fc2c03f2a
Business Live Chat Software 1.0 Cross Site Request Forgery
Posted Feb 26, 2020
Authored by Meisam Monsef

Business Live Chat Software version 1.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | ce27f7aee229138d952cf8d2435eb4aec6b21f40ec4ff582c7ee3c49ef97d2c0
Red Hat Security Advisory 2020-0609-01
Posted Feb 26, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0609-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow and use-after-free vulnerabilities.

tags | advisory, overflow, kernel, vulnerability
systems | linux, redhat
advisories | CVE-2018-20976, CVE-2019-11085, CVE-2019-14895, CVE-2019-17133
SHA-256 | 1704e88839d3a2e0bb88213d4d92ae32aa951a7da471d4548ebd7e57aa5bbccd
PhpIX 2012 Professional (Beta) SQL Injection
Posted Feb 26, 2020
Authored by indoushka

PhpIX 2012 Professional (Beta) suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | a7d2c1dad83a8e2dadaa2750e429478f35c735c63b192316935b65bd8f94d363
Core FTP LE 2.2 Denial Of Service
Posted Feb 26, 2020
Authored by Ismael Nava

Core FTP LE version 2.2 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | e2ab37670d91bc1c8ad507a3584060354b682133086609a64574cf7fed9da8cf
Red Hat Security Advisory 2020-0605-01
Posted Feb 26, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0605-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This asynchronous patch is a security update for the wildfly-security-manager package in Red Hat JBoss Enterprise Application Platform 7.2 for Red Hat Enterprise Linux 6, 7, and 8.

tags | advisory, java
systems | linux, redhat
advisories | CVE-2020-7238
SHA-256 | 6ae1c40c03924b18c0d8eebf697cacbbc5d0f9e16c0b8488fb583b8746188b35
Apache Tomcat AJP Ghostcat File Read / Inclusion
Posted Feb 26, 2020
Authored by ydhcui

Apache Tomcat AJP Ghostcat file read and inclusion exploit.

tags | exploit, file inclusion
advisories | CVE-2020-10487
SHA-256 | 2cb37d2adc51e868f0ba9c5b8b8f0150f2aacbb92a005b9a560ea332c4143aab
Red Hat Security Advisory 2020-0606-01
Posted Feb 26, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0606-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This asynchronous patch is a security update for the wildfly-security-manager package in Red Hat JBoss Enterprise Application Platform 7.2. HTTP request smuggling was addressed along with other security issues.

tags | advisory, java, web
systems | linux, redhat
advisories | CVE-2020-7238
SHA-256 | eee7443a646fa70abdc0833f65aebb58f6cdd0629b9ffcb0b58a1b56b9767cd3
Red Hat Security Advisory 2020-0602-01
Posted Feb 26, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0602-01 - Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. HTTP request smuggling was addressed along with other security issues.

tags | advisory, web, javascript
systems | linux, redhat
advisories | CVE-2019-15604, CVE-2019-15605, CVE-2019-15606, CVE-2019-16775, CVE-2019-16776, CVE-2019-16777
SHA-256 | 06640bfa1968df0b472481ae67bb1e2f62f27a46e4050fa57fce9b5cec78e50b
AVAST Generic Archive Bypass
Posted Feb 26, 2020
Authored by Thierry Zoller

The AVAST parsing engine supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating a ZIP archive so that it can be accessed by an end-user but not the anti-virus software. The AV engine is unable to scan the container and gives the file a "clean" rating.

tags | advisory, virus
advisories | CVE-2020-9399
SHA-256 | 04142bff062e990548f8097f71222a4ee9c85d1768f97fcbf3deca2f91ed21e3
Easy2Pilot 8 SQL Injection / Cross Site Request Forgery
Posted Feb 26, 2020
Authored by indoushka

Easy2Pilot version 8 suffers from remote SQL injection, backdoor account, and cross site request forgery vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, csrf
SHA-256 | 851a67bfd8ce384f26b48979d982f4ba8f81ab365429667ea3ce3ad73ebc3d8c
Red Hat Security Advisory 2020-0601-01
Posted Feb 26, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0601-01 - Red Hat AMQ Clients enable connecting, sending, and receiving messages over the AMQP 1.0 wire transport protocol to or from AMQ Broker 6 and 7. This update provides various bug fixes and enhancements in addition to the client package versions previously released on Red Hat Enterprise Linux 6, 7, and 8.

tags | advisory, protocol
systems | linux, redhat
advisories | CVE-2019-20444, CVE-2019-20445, CVE-2020-7238
SHA-256 | 8d43dd0822bbae7d88d811021e172eed30df934e109bf667724da9e33aa4290a
DirectWeb 0.4.0 Cross Site Scripting
Posted Feb 26, 2020
Authored by indoushka

DirectWeb version 0.4.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | d77b1c678881bde75ca97d7ebe5dff0397a1af27b70a9eee74d587c2a8bec01b
Cacti 1.2.8 Authenticated Remote Code Execution
Posted Feb 26, 2020
Authored by Askar

Cacti version 1.2.8 suffers from an authenticated remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2020-8813
SHA-256 | 56cc6422c5477bd9cb39748c97408cbda4d9c2b376cadcbfd9f1e8930b549790
Cacti 1.2.8 Unauthenticated Remote Code Execution
Posted Feb 26, 2020
Authored by Askar

Cacti version 1.2.8 suffers from an unauthenticated remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2020-8813
SHA-256 | b14631bfc6fe1d158869f68e3d4b39c3a7081d27db7f6278239eea4c70b81555
OpenSMTPD Out-Of-Bounds Read
Posted Feb 25, 2020
Authored by Qualys Security Advisory

Qualys discovered a vulnerability in OpenSMTPD, OpenBSD's mail server. This vulnerability, an out-of-bounds read introduced in December 2015, is exploitable remotely and leads to the execution of arbitrary shell commands.

tags | exploit, arbitrary, shell
systems | openbsd
advisories | CVE-2020-8794
SHA-256 | 2c58b82819510289b2fd55d1c6a82b81b279777abd6a6b0db391f990ec12b148
OpenSMTPD Local Information Disclosure
Posted Feb 25, 2020
Authored by Qualys Security Advisory

Qualys discovered a minor vulnerability in OpenSMTPD, OpenBSD's mail server. An unprivileged local attacker can read the first line of an arbitrary file (for example, root's password hash in /etc/master.passwd) or the entire contents of another user's file (if this file and /var/spool/smtpd/ are on the same filesystem). A proof of concept exploit is included in this archive.

tags | exploit, arbitrary, local, root, proof of concept
systems | openbsd
advisories | CVE-2020-8793
SHA-256 | 3617b8854e485e1d063e08764e96429e54c6b7bb0467d127e819133f80c925d5
Astak CM-818T3 Remote Configuration Disclosure
Posted Feb 25, 2020
Authored by Todor Donev

Astak CM-818T3 2.4GHz wireless security surveillance camera remote configuration disclosure exploit.

tags | exploit, remote
SHA-256 | ad19dd11d7736fd3ada2ef71991e1c460b83b06c633d85a704dad751959e2c2a
Cisco Unified Contact Center Express Privilege Escalation
Posted Feb 25, 2020
Authored by Jamie R

Cisco Unified Contact Center Express suffers from a privilege escalation vulnerability.

tags | advisory
systems | cisco
advisories | CVE-2019-1888
SHA-256 | 3b4a032f286a08e996bc7bfa0eaa2fdd87978080ffb2a1d130af4339afc53464
Page 2 of 16
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close