exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 2020-05-15 to 2020-05-16

TOR Virtual Network Tunneling Tool 0.4.3.5
Posted May 15, 2020
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: Tor 0.4.3.5 is the first stable release in the 0.4.3.x series. This series adds support for building without relay code enabled, and implements functionality needed for OnionBalance with v3 onion services. It includes significant refactoring of our configuration and controller functionality, and fixes numerous smaller bugs and performance issues.
tags | tool, remote, local, peer2peer
systems | unix
SHA-256 | 616a0e4ae688d0e151d46e3e4258565da4d443d1ddbd316db0b90910e2d5d868
ManageEngine AssetExplorer Authenticated Command Execution
Posted May 15, 2020
Authored by Sahil Dhar, xen1thLabs

ManageEngine AssetExplorer versions prior to 6.5 (6503) suffer from an authenticated remote command execution vulnerability.

tags | exploit, remote
advisories | CVE-2019-19034
SHA-256 | 78e2dfe15fe4ac8812878531114733d90bacff83962512be4ff408289bef63d6
Microsoft Windows Task Scheduler Security Feature Bypass
Posted May 15, 2020
Authored by Sylvain Heiniger

Compass Security identified a security feature bypass vulnerability in Microsoft Windows. Due to the absence of integrity verification requirements for the RPC protocol and in particular the Task Scheduler, a man-in-the-middle attacker can relay his victim's NTLM authentication to a target of his choice over the RPC protocol. Provided the victim has administrative privileges on the target, the attacker can execute code on the remote target.

tags | exploit, remote, protocol, bypass
systems | windows
advisories | CVE-2020-1113
SHA-256 | 16fcf81541831c6f1a2109c00a1d366d79871db6b8aecafaba474512db27d1b8
Ubuntu Security Notice USN-4360-3
Posted May 15, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4360-3 - USN-4360-1 fixed a vulnerability in json-c. The security fix introduced a memory leak in some scenarios. This update reverts the security fix pending further investigation. It was discovered that json-c incorrectly handled certain JSON files. An attacker could possibly use this issue to execute arbitrary code. Various other issues were also addressed.

tags | advisory, arbitrary, memory leak
systems | linux, ubuntu
SHA-256 | c84b4fa79a09511a77239456c6c9d7e8230e9d6b28da09f314a8b822e41740b5
Ubuntu Security Notice USN-4360-2
Posted May 15, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4360-2 - USN-4360-1 fixed a vulnerability in json-c. The security fix introduced a memory leak in some scenarios. This update reverts the security fix pending further investigation. It was discovered that json-c incorrectly handled certain JSON files. An attacker could possibly use this issue to execute arbitrary code. Various other issues were also addressed.

tags | advisory, arbitrary, memory leak
systems | linux, ubuntu
SHA-256 | 1366fa1cab3bfb43a300c29d0ae22c498182a5143e34811ae9f4211fb6c8a264
ACal 2.2.6 Remote Code Execution
Posted May 15, 2020
Authored by Bobby Cooke

ACal version 2.2.6 suffers from a one-click remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | b32ebcce27b52719f4cf51ee40137cc6d13cbab93a57f639a9f947d5d9d8ddf0
Gentoo Linux Security Advisory 202005-13
Posted May 15, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202005-13 - Multiple vulnerabilities have been found in Chromium and Google Chrome, the worst of which could result in the arbitrary execution of code. Versions less than 81.0.4044.138 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2020-6461, CVE-2020-6462, CVE-2020-6464
SHA-256 | 4ad238269babd468d2efbc484d0d8f5c37e3ada63292c109f8d6592f148db129
Gentoo Linux Security Advisory 202005-12
Posted May 15, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202005-12 - Multiple vulnerabilities have been found in OpenSLP, the worst of which could result in the arbitrary execution of code. Versions less than or equal to 2.0.0-r5 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2017-17833, CVE-2019-5544
SHA-256 | 556ed88a88673e3ae306f769029cc5879baf1584d96d1dc5596110e415cbfb52
Gentoo Linux Security Advisory 202005-11
Posted May 15, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202005-11 - A buffer overflow in VLC might allow local or remote attacker(s) to execute arbitrary code. Versions less than 3.0.10 are affected.

tags | advisory, remote, overflow, arbitrary, local
systems | linux, gentoo
advisories | CVE-2019-19721
SHA-256 | 7278d1f2b0dccd639213114dd7db125b1986e067140664c35f39af5fa948f45a
Gentoo Linux Security Advisory 202005-10
Posted May 15, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202005-10 - Multiple vulnerabilities have been found in libmicrodns, the worst of which could result in the arbitrary execution of code. Versions less than 0.1.2 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2020-6071, CVE-2020-6072, CVE-2020-6073, CVE-2020-6077, CVE-2020-6078, CVE-2020-6079, CVE-2020-6080
SHA-256 | 66c281f96d26b266f316a42a4d0d4eee8789cb50241c96fcbd5f7d23c993d110
Gentoo Linux Security Advisory 202005-09
Posted May 15, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202005-9 - A vulnerability in Python could lead to a Denial of Service condition. Versions less than 2.7.18:2.7 are affected.

tags | advisory, denial of service, python
systems | linux, gentoo
advisories | CVE-2020-8492
SHA-256 | 2d7f5b8342ce35b98f6e8586a81331d05e7437a9e67b4693d40ce2f035b09707
Gentoo Linux Security Advisory 202005-08
Posted May 15, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202005-8 - Multiple vulnerabilities have been found in Xen, the worst of which could allow privilege escalation. Versions less than 4.12.2-r2 are affected.

tags | advisory, vulnerability
systems | linux, gentoo
advisories | CVE-2020-11739, CVE-2020-11740, CVE-2020-11741, CVE-2020-11742, CVE-2020-11743
SHA-256 | 8ba00f32c4e9e8000a32d7371e9e6a65e8aad643c362364438ff870a9a4f70d0
Gentoo Linux Security Advisory 202005-07
Posted May 15, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202005-7 - Multiple vulnerabilities have been found in FreeRDP, the worst of which could result in a Denial of Service condition. Versions less than 2.1.0 are affected.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
advisories | CVE-2019-17177, CVE-2020-11521, CVE-2020-11522, CVE-2020-11523, CVE-2020-11524, CVE-2020-11525, CVE-2020-11526
SHA-256 | 227933ffe1a534a462d85ef16f4a0a62cb25e725bbda1e13d8c443003acca4db
Gentoo Linux Security Advisory 202005-06
Posted May 15, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202005-6 - Multiple vulnerabilities have been found in LIVE555 Media Server, the worst of which could result in the arbitrary execution of code. Versions less than 2020.03.06 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2018-4013, CVE-2019-15232, CVE-2019-6256, CVE-2019-7314, CVE-2019-7733, CVE-2019-9215
SHA-256 | 529f6554764bdfa0755547d1ea417bd9b760f1aba7ecd493ca46b305f32e8e44
SecureCRT Memory Corruption
Posted May 15, 2020
Authored by Tavis Ormandy, Google Security Research

SecureCRT suffers from a memory corruption vulnerability in CSI functions.

tags | exploit
advisories | CVE-2020-12651
SHA-256 | e059a439c55289e0f1a5019136f7bbd0d69fc1efd9b8d3c24ced68d1c3f9d004
ManageEngine Service Desk 10.0 Cross Site Scripting
Posted May 15, 2020
Authored by Felipe Molina

ManageEngine Service Desk version 10.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2019-15083
SHA-256 | 469e92a043840addd4c43d4eb114c7ef988c00069a831c8b52bc518e495ec1e9
vBulletin 5.6.1 SQL Injection
Posted May 15, 2020
Authored by Photubias

vBulletin version 5.6.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2020-12720
SHA-256 | e9bdd1a9c7ac4c698df1254cb099a495abfb2879f7affcf386aead86ed8ab655
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close