exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 22 of 22 RSS Feed

Files Date: 2019-05-07

I2P 0.9.40
Posted May 7, 2019
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: New icons. Various other updates.
tags | tool
systems | unix
SHA-256 | 5d31e0a324dfe429135ac17595b3cab3e81d85d4aa7a720db402dec47bfeda23
Red Hat Security Advisory 2019-1024-01
Posted May 7, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-1024-01 - Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. Issues addressed include a bypass vulnerability.

tags | advisory, bypass
systems | linux, redhat
advisories | CVE-2019-10063
SHA-256 | 70ee9583323959a941fd02894a8b3e1cac2025eccfea01cc74253cb5f82ad559
Red Hat Security Advisory 2019-1021-01
Posted May 7, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-1021-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 74.0.3729.108. Issues addressed include buffer overflow, bypass, and information leakage vulnerabilities.

tags | advisory, web, overflow, vulnerability
systems | linux, redhat
advisories | CVE-2019-5805, CVE-2019-5806, CVE-2019-5807, CVE-2019-5808, CVE-2019-5809, CVE-2019-5810, CVE-2019-5811, CVE-2019-5813, CVE-2019-5814, CVE-2019-5815, CVE-2019-5818, CVE-2019-5819, CVE-2019-5820, CVE-2019-5821, CVE-2019-5822, CVE-2019-5823
SHA-256 | 71a9438fc498a7c72edff22089be6b782351b494d1b1c531ff8caf4c1da15d7c
Red Hat Security Advisory 2019-1017-01
Posted May 7, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-1017-01 - The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed. Issues addressed include a missing attack vector protection.

tags | advisory
systems | linux, redhat
advisories | CVE-2019-3839
SHA-256 | cdbb4ee33ff6076217f9e3c49cfe5bb478a15e028e0e89f1526e2a08c1885880
Red Hat Security Advisory 2019-1022-01
Posted May 7, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-1022-01 - The python-jinja2 package contains Jinja2, a template engine written in pure Python. Jinja2 provides a Django inspired non-XML syntax but supports inline expressions and an optional sandboxed environment. Issues addressed include an information leakage vulnerability.

tags | advisory, python
systems | linux, redhat
advisories | CVE-2016-10745
SHA-256 | 591e530022d693e35e8d32ad415545349a33e6b9756e352e46a165e4a357b50a
PostgreSQL COPY FROM PROGRAM Command Execution
Posted May 7, 2019
Authored by Jacob Wilkin | Site metasploit.com

Installations running Postgres 9.3 and above have functionality which allows for the superuser and users with 'pg_execute_server_program' to pipe to and from an external program using COPY. This allows arbitrary command execution as though you have console access. This module attempts to create a new table, then execute system commands in the context of copying the command output into the table. This Metasploit module should work on all Postgres systems running version 9.3 and above. For Linux and OSX systems, target 1 is used with cmd payloads such as: cmd/unix/reverse_perl. For Windows Systems, target 2 is used with powershell payloads such as: cmd/windows/powershell_reverse_tcp. Alternatively target 3 can be used to execute generic commands, such as a web_delivery meterpreter powershell payload or other customized command.

tags | exploit, arbitrary
systems | linux, windows, unix, apple
advisories | CVE-2019-9193
SHA-256 | c46a7605f2f59df142894ab93e39c6fbb9ceb49da8db00d316382c22458faf6e
Oracle Weblogic Server Deserialization Remote Code Execution
Posted May 7, 2019
Authored by Andres Rodriguez | Site metasploit.com

An unauthenticated attacker with network access to the Oracle Weblogic Server T3 interface can send a malicious SOAP request to the interface WLS AsyncResponseService to execute code on the vulnerable host.

tags | exploit
advisories | CVE-2019-2725
SHA-256 | 7b103f91354f91a5368f07e6173b43d3e6d6c1255ccab672a82be3ddeaa8b9f2
Ubuntu Security Notice USN-3969-1
Posted May 7, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3969-1 - It was discovered that wpa_supplicant and hostapd incorrectly handled unexpected fragments when using EAP-pwd. A remote attacker could possibly use this issue to cause a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2019-11555
SHA-256 | 6e169c2098110fa624ea682fb1f9eff00b9bce4271250c82d0730503639041bc
Red Hat Security Advisory 2019-0984-01
Posted May 7, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0984-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. SQLAlchemy is an Object Relational Mapper that provides a flexible, high-level interface to SQL databases. Issues addressed include a remote SQL injection vulnerability.

tags | advisory, remote, sql injection, python
systems | linux, redhat
advisories | CVE-2019-7164, CVE-2019-7548
SHA-256 | 78f2b0c17e9dfc47d517a9849cf864e7723b0120abb46f94062ed215b7d60bfb
Red Hat Security Advisory 2019-0972-01
Posted May 7, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0972-01 - Openwsman is a project intended to provide an open source implementation of the Web Services Management specification and to expose system management information on the Linux operating system using the WS-Management protocol. WS-Management is based on a suite of web services specifications and usage requirements that cover all system management aspects. Issues addressed include a file disclosure vulnerability.

tags | advisory, web, protocol
systems | linux, redhat
advisories | CVE-2019-3816
SHA-256 | eb6a0335dcac9528ac79026bd9c186ecaad47b13c449efc1cef4a6ff50b97569
Red Hat Security Advisory 2019-0985-01
Posted May 7, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0985-01 - The mod_auth_mellon module for the Apache HTTP Server is an authentication service that implements the SAML 2.0 federation protocol. The module grants access based on the attributes received in assertions generated by an IdP server. Issues addressed include a bypass vulnerability.

tags | advisory, web, protocol, bypass
systems | linux, redhat
advisories | CVE-2019-3878
SHA-256 | 0125077032659c23bab04ac7f7d1d43fbaa2dd7903083d00b0ea006b173b0fbf
Red Hat Security Advisory 2019-0983-01
Posted May 7, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0983-01 - The wget packages provide the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols. Issues addressed include a buffer overflow vulnerability.

tags | advisory, web, overflow, protocol
systems | linux, redhat
advisories | CVE-2019-5953
SHA-256 | 3df8d372da645dfff7327693c1fcc17208f4f1527490624b509cf01336936de9
Red Hat Security Advisory 2019-0997-01
Posted May 7, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0997-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. This package provides the "python3" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3-libs package, which should be installed automatically along with python3. The remaining parts of the Python standard library are broken out into the python3-tkinter and python3-test packages. Issues addressed include an information leakage vulnerability.

tags | advisory, python
systems | linux, redhat
advisories | CVE-2019-9636
SHA-256 | 0706f54db778ad328c1b0efc96b5ff3ee3da1cce5a5bdf363324b8596f92cea6
Red Hat Security Advisory 2019-0981-01
Posted May 7, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0981-01 - Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. SQLAlchemy is an Object Relational Mapper that provides a flexible, high-level interface to SQL databases. Issues addressed include information leakage and remote SQL injection vulnerabilities.

tags | advisory, remote, vulnerability, sql injection, python
systems | linux, redhat
advisories | CVE-2019-7164, CVE-2019-7548, CVE-2019-9636
SHA-256 | ddd1cf03a956d8089cb1ded5cc4cd8ddf02a950d7aec570e495b738d17e1b2c9
Red Hat Security Advisory 2019-0980-01
Posted May 7, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0980-01 - The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Issues addressed include a bypass vulnerability.

tags | advisory, web, bypass
systems | linux, redhat
advisories | CVE-2019-0211, CVE-2019-0215
SHA-256 | 0d471fc4d79ad4660814e40b39efce40484b416271cee12b400763cc07a0892b
Red Hat Security Advisory 2019-0968-01
Posted May 7, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0968-01 - EDK is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow
systems | linux, redhat
advisories | CVE-2018-12180
SHA-256 | 8ad0f9302a4194a67993224b4b172b1a26883163821c2fb65ed4f96654ac7f68
Red Hat Security Advisory 2019-0971-01
Posted May 7, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0971-01 - The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed. Issues addressed include some missing attack vector protections.

tags | advisory
systems | linux, redhat
advisories | CVE-2019-3835, CVE-2019-3838, CVE-2019-3839
SHA-256 | a9bff1942cef8e34246ee73871fa46baf34d82e3b31bccd64653fd9c4a011be1
Red Hat Security Advisory 2019-0990-01
Posted May 7, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0990-01 - The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. Issues addressed include an input validation vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2019-6454
SHA-256 | 09cb16c3d1775705c79a44db279157ea99653597312ad697a9852cdd131f3490
Red Hat Security Advisory 2019-0975-01
Posted May 7, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0975-01 - The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Issues addressed include a runc binary overwrite vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2019-5736
SHA-256 | 361971a901acb2e5cf0317a4e5d2151265c70d089dbf99e7b20cc0f66d6a31cf
Red Hat Security Advisory 2019-0966-01
Posted May 7, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0966-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 60.6.1 ESR. Issues addressed include a use-after-free vulnerability.

tags | advisory, web
systems | linux, redhat
advisories | CVE-2018-18506, CVE-2019-9788, CVE-2019-9790, CVE-2019-9791, CVE-2019-9792, CVE-2019-9793, CVE-2019-9795, CVE-2019-9796, CVE-2019-9810, CVE-2019-9813
SHA-256 | ffaa4285ea0b86a7be83080eb435738e399a2851b88b2578de2b6ff86832514a
Admin Express 1.2.5.485 Buffer Overflow
Posted May 7, 2019
Authored by Connor McGarr

Admin Express version 1.2.5.485 folder path local SEH alphanumeric encoded buffer overflow exploit.

tags | exploit, overflow, local
SHA-256 | f17721a81a44f7a201fc447455c70acfe27cd8c856b588162d5b42870310732f
Easy Chat Server 3.1 Denial Of Service
Posted May 7, 2019
Authored by Miguel Mendez Z

Easy Chat Server version 3.1 message denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
SHA-256 | 68d09096db3d2bfa28612534eb056bc6d6d8041763eb27224b0f06b56bdce900
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close