exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2020-07-23 to 2020-07-24

Ubuntu Security Notice USN-4433-1
Posted Jul 23, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4433-1 - Johannes Kuhn discovered that OpenJDK incorrectly handled access control contexts. An attacker could possibly use this issue to execute arbitrary code. It was discovered that OpenJDK incorrectly handled memory allocation when reading TIFF image files. An attacker could possibly use this issue to cause a denial of service. It was discovered that OpenJDK incorrectly handled input data. An attacker could possibly use this issue to insert, edit or obtain sensitive information. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2020-14556, CVE-2020-14562, CVE-2020-14573, CVE-2020-14577, CVE-2020-14581, CVE-2020-14583, CVE-2020-14593, CVE-2020-14621
SHA-256 | 8e8cb87ca79806cf6127f395fb824cde823abf6a54241c7e85eaa05eb4ab39df
EternalBlueC EternalBlue Suite
Posted Jul 23, 2020
Authored by bhassani | Site github.com

EternalBlueC is the EternalBlue suite remade in C which includes an MS17-010 exploit, EternalBlue/MS17-010 vulnerability detector, DoublePulsar detector, and DoublePulsar UploadDLL and shellcode.

tags | exploit, shellcode
SHA-256 | f58498ce3ca66c84f0bc061eb5766104eb7d8e10ed8cedcec829db3061d61bea
Red Hat Security Advisory 2020-3133-01
Posted Jul 23, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3133-01 - AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. This release of Red Hat AMQ Broker 7.4.4 serves as a replacement for Red Hat AMQ Broker 7.4.3, and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service, protocol
systems | linux, redhat
advisories | CVE-2018-15756, CVE-2020-10727, CVE-2020-11612, CVE-2020-1953
SHA-256 | 33ec272ba760814b950affc8130b7170d412faa133a83258e944a6d59f066d27
Ubuntu Security Notice USN-4430-2
Posted Jul 23, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4430-2 - USN-4430-1 fixed vulnerabilities in Pillow. This update provides the corresponding updates for Ubuntu 20.04 LTS. It was discovered that Pillow incorrectly handled certain image files. If a user or automated system were tricked into opening a specially-crafted image file, a remote attacker could possibly cause Pillow to crash, resulting in a denial of service. Various other issues were also addressed.

tags | advisory, remote, denial of service, vulnerability
systems | linux, ubuntu
advisories | CVE-2020-10177, CVE-2020-11538
SHA-256 | 380d4f373b158569d565b55349373f7849142e22dec46f36f4e1f183a7cace01
Red Hat Security Advisory 2020-2905-01
Posted Jul 23, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-2905-01 - This release of Red Hat build of Thorntail 2.7.0 includes security updates, bug fixes, and enhancements. For more information, see the release notes listed in the References section. Issues addressed include bypass, code execution, cross site scripting, memory exhaustion, and traversal vulnerabilities.

tags | advisory, vulnerability, code execution, xss
systems | linux, redhat
advisories | CVE-2019-12423, CVE-2019-17573, CVE-2020-10688, CVE-2020-10705, CVE-2020-10719, CVE-2020-1695, CVE-2020-1697, CVE-2020-1698, CVE-2020-1714, CVE-2020-1718, CVE-2020-1719, CVE-2020-1724, CVE-2020-1727, CVE-2020-1732, CVE-2020-1744, CVE-2020-1745, CVE-2020-1757, CVE-2020-6950
SHA-256 | c38261c0e1296dd1542569082b9ba44974a529f19ff358410a12de10337e694e
Red Hat Security Advisory 2020-3118-01
Posted Jul 23, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3118-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allows PC-compatible machines to share files, printers, and various information. Issues addressed include null pointer and use-after-free vulnerabilities.

tags | advisory, vulnerability, protocol
systems | linux, redhat
advisories | CVE-2020-10730
SHA-256 | 2fab0ac15956ce9836beab8eddf7f9e7e829e49cf8e1cbe162dfecf7982d7ad6
Red Hat Security Advisory 2020-3119-01
Posted Jul 23, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3119-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allow PC-compatible machines to share files, printers, and various information. Issues addressed include null pointer and use-after-free vulnerabilities.

tags | advisory, vulnerability, protocol
systems | linux, redhat
advisories | CVE-2020-10730
SHA-256 | 676dddcd89d65ac6055af4de6712adb1179a0a0ccdcd5803bcc4f8d10979d3c4
Ubuntu Security Notice USN-4431-1
Posted Jul 23, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4431-1 - It was discovered that FFmpeg incorrectly verified empty audio packets or HEVC data. An attacker could possibly use this issue to cause a denial of service via a crafted file. This issue only affected Ubuntu 16.04 LTS, as it was already fixed in Ubuntu 18.04 LTS.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2018-15822, CVE-2019-12730, CVE-2019-13312, CVE-2019-13390, CVE-2019-17539, CVE-2019-17542, CVE-2020-12284, CVE-2020-13904
SHA-256 | 09360fbe76e434880b49f3b0bb8961f0d26db5eb0724966fb2ef006d9225dff2
Sifter 8.5_2
Posted Jul 23, 2020
Authored by s1l3nt78 | Site github.com

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

Changes: Additions and updates.
tags | tool, remote, local, scanner, vulnerability
systems | unix
SHA-256 | 0f8a324c594df6903065df369239125062b21eec1ea661666a6383e87b81397e
FTPDummy! 4.80 Local Buffer Overflow
Posted Jul 23, 2020
Authored by Felipe Winsnes

FTPDummy! version 4.80 local SEH buffer overflow exploit that pops calc.exe.

tags | exploit, overflow, local
SHA-256 | e789aa53f0af9ec818e490ac9835551daa25841a122ea62cfaa02d45e30c11e0
Online Book Store 1.0 Code Execution
Posted Jul 23, 2020
Authored by Tib3rius, cesgami

This is a modified remote code execution exploit for Online Book Store version 1.0.

tags | exploit, remote, code execution
SHA-256 | 258734217c1ebfc32752dcfa5912fa225ab5c1df733098ee5f95f5082863e524
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close