exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 23 of 23 RSS Feed

Files Date: 2020-03-25

Hackers 2 Hackers Conference 17th Edition Call For Papers
Posted Mar 25, 2020
Site h2hc.com.br

The call for papers for H2HC 17th edition is now open. H2HC is a hacker conference taking place in Sao Paulo, Brazil, from October 24th through the 25th of 2020.

tags | paper, conference
SHA-256 | 75573200270bcae21dea1558621c5a67cc642c6d5b05b3dccecd24c4a1191ae8
HP ThinPro 6.x / 7.x Privileged Command Injection
Posted Mar 25, 2020
Authored by Eldar Marcussen

HP ThinPro versions 7.1, 7.0, 6.2.1, and 6.2 suffer from a privileged command injection vulnerability.

tags | exploit
advisories | CVE-2019-18910
SHA-256 | 14f2502cce1f48d90d5604ec27b5fd00b49d92dca7461a8a5b30b18ade28ee1f
Apple Security Advisory 2020-03-24-7
Posted Mar 25, 2020
Authored by Apple | Site apple.com

Apple Security Advisory 2020-03-24-7 - Xcode 11.4 is now available and contains security improvements.

tags | advisory
systems | apple
SHA-256 | d02db7ad3d9960d89fcd3efe2b4ac851874b741be7021bab3035001ca6813792
HP ThinPro 6.x / 7.x Citrix Command Injection
Posted Mar 25, 2020
Authored by Eldar Marcussen

HP ThinPro versions 7.1, 7.0, 6.2.1, and 6.2 suffer from a Citrix receiver connection wrapper command injection vulnerability.

tags | exploit
advisories | CVE-2019-18909
SHA-256 | eb4c697a97d752e546087c1c92f72f5ac8c5d658671e63bf3352ddfb5a13cb26
Apple Security Advisory 2020-03-24-6
Posted Mar 25, 2020
Authored by Apple | Site apple.com

Apple Security Advisory 2020-03-24-6 - iTunes for Windows 12.10.5 is now available and addresses buffer overflow, code execution, and cross site scripting vulnerabilities.

tags | advisory, overflow, vulnerability, code execution, xss
systems | windows, apple
advisories | CVE-2020-3885, CVE-2020-3887, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-3909, CVE-2020-3910, CVE-2020-3911, CVE-2020-9783
SHA-256 | f11725cb1646bebc3242e1811552fc47c0fb08125873f5493a6ad00baaea3a87
LeptonCMS 4.5.0 Cross Site Scripting
Posted Mar 25, 2020
Authored by SunCSR

LeptonCMS version 4.5.0 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 69f616129e2c4bf5f159ecfb5f0750a11ca30ed7cf043ca3adbd5518d48f2b43
Apple Security Advisory 2020-03-24-5
Posted Mar 25, 2020
Authored by Apple | Site apple.com

Apple Security Advisory 2020-03-24-5 - Safari 13.1 is now available and addresses code execution and cross site scripting vulnerabilities.

tags | advisory, vulnerability, code execution, xss
systems | apple
advisories | CVE-2020-3885, CVE-2020-3887, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-9783, CVE-2020-9784
SHA-256 | 97d95b9be861f9f336433071faf1a2705a8e9146341d71942b34d5f3a5653ef9
SITS:Vision 9.7.0 Authentication Bypass
Posted Mar 25, 2020
Authored by Callum Murphy

An authentication bypass vulnerability is present in the stand-alone SITS:Vision component of Tribal SITS in its default configuration, related to unencrypted communications sent by the client each time it is launched. This vulnerability allows unauthenticated attackers to gain access to credentials or execute arbitrary SQL queries on the SITS backend as long as they have access to the client executable or can intercept traffic from a user who does. Version 9.7.0 is affected.

tags | advisory, arbitrary, bypass
advisories | CVE-2019-19127
SHA-256 | 72b6b1b2c50fcb2bd1a4f629d69aabd35faef658148a4bbb263c4cfcc2a47d7a
Red Hat Security Advisory 2020-0866-01
Posted Mar 25, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0866-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. An issue was resolved where /etc/passwd was given incorrect privileges.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-1705
SHA-256 | 908f5468885e683aed21ca87766bb7df0877b37939365fcba512de5a6019e48d
10-Strike Network Inventory Explorer 8.54 Buffer Overflow
Posted Mar 25, 2020
Authored by Felipe Winsnes

10-Strike Network Inventory Explorer version 8.54 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | b750edb9ae02530ef17a6f2e73cd311df7be28c4f76be1631cc5f3246861c2e9
Apple Security Advisory 2020-03-24-4
Posted Mar 25, 2020
Authored by Apple | Site apple.com

Apple Security Advisory 2020-03-24-4 - watchOS 6.2 is now available and addresses buffer overflow and code execution vulnerabilities.

tags | advisory, overflow, vulnerability, code execution
systems | apple
advisories | CVE-2020-3883, CVE-2020-3891, CVE-2020-3895, CVE-2020-3897, CVE-2020-3900, CVE-2020-3901, CVE-2020-3909, CVE-2020-3910, CVE-2020-3911, CVE-2020-3913, CVE-2020-3914, CVE-2020-3916, CVE-2020-3917, CVE-2020-3919, CVE-2020-9768, CVE-2020-9773, CVE-2020-9785
SHA-256 | 93b7afb50e3468877e73ca42bf16f1f15fd908f7232d8cb582fef0cf2003cec3
HP ThinPro 6.x / 7.x Privilege Escalation
Posted Mar 25, 2020
Authored by Eldar Marcussen

HP ThinPro versions 7.1, 7.0, 6.2.1, and 6.2 suffer from a local privilege escalation vulnerability.

tags | exploit, local
advisories | CVE-2019-16287
SHA-256 | 7f1293575b0e76de415de2ab20c4993ec2addd8fcc7cbbb76e519c22ef4b967d
HP ThinPro 6.x / 7.x Filter Bypass
Posted Mar 25, 2020
Authored by Eldar Marcussen

HP ThinPro versions 7.1, 7.0, 6.2.1, and 6.2 suffer from an application filter bypass vulnerability.

tags | exploit, bypass
advisories | CVE-2019-16286
SHA-256 | 99ae4d99639a753124299498c99f9195e518195f8a8f6da78f571fd9c30371c5
10-Strike Network Inventory Explorer 8.54 Unquoted Service Path
Posted Mar 25, 2020
Authored by Felipe Winsnes

10-Strike Network Inventory Explorer version 8.54 suffers from a srvInventoryWebServer unquoted service path vulnerability.

tags | exploit
SHA-256 | ba13fbe3f34c7b701b97a3133f2a283428e9c259eea48caa051f8e745a483948
Apple Security Advisory 2020-03-24-3
Posted Mar 25, 2020
Authored by Apple | Site apple.com

Apple Security Advisory 2020-03-24-3 - tvOS 13.4 is now available and addresses buffer overflow, code execution, and cross site scripting vulnerabilities.

tags | advisory, overflow, vulnerability, code execution, xss
systems | apple
advisories | CVE-2020-3883, CVE-2020-3885, CVE-2020-3887, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-3909, CVE-2020-3910, CVE-2020-3911, CVE-2020-3914, CVE-2020-3917, CVE-2020-3919, CVE-2020-9768, CVE-2020-9773, CVE-2020-9783, CVE-2020-9785
SHA-256 | e6e28715d1eabf0a553ca9c9f2eced04bde432b7de0ae88503f9520de4642fc9
HP ThinPro 6.x / 7.x Information Disclosure
Posted Mar 25, 2020
Authored by Eldar Marcussen

HP ThinPro versions 7.1, 7.0, 6.2.1, and 6.2 suffer from a local physical access information disclosure vulnerability.

tags | exploit, local, info disclosure
advisories | CVE-2019-16285
SHA-256 | 64f3925e91a779a52ebd3d1823441c27cdb0af76a86d87a223161adc1862bbed
Apple Security Advisory 2020-03-24-2
Posted Mar 25, 2020
Authored by Apple | Site apple.com

Apple Security Advisory 2020-03-24-2 - macOS Catalina 10.15.4, Security Update 2020-002 Mojave, Security Update 2020-002 High Sierra are now available and address buffer overflow, bypass, code execution, and information leakage vulnerabilities.

tags | advisory, overflow, vulnerability, code execution
systems | apple
advisories | CVE-2019-14615, CVE-2019-19232, CVE-2019-8853, CVE-2020-3851, CVE-2020-3881, CVE-2020-3883, CVE-2020-3884, CVE-2020-3892, CVE-2020-3893, CVE-2020-3903, CVE-2020-3904, CVE-2020-3905, CVE-2020-3906, CVE-2020-3907, CVE-2020-3908, CVE-2020-3909, CVE-2020-3910, CVE-2020-3911, CVE-2020-3912, CVE-2020-3913, CVE-2020-3914, CVE-2020-3919, CVE-2020-9769, CVE-2020-9773, CVE-2020-9776, CVE-2020-9785
SHA-256 | 4b2e9754cfcc9e3fb6de389ec4b869006d47a50063e5e2135d1dfb561a85ed02
Red Hat Security Advisory 2020-0863-01
Posted Mar 25, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0863-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a use-after-free vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-8945
SHA-256 | a6793c3c4c35b36e6be2d9063b23c55353aeb1ee1a495dbbfccff471e598fa0b
Apple Security Advisory 2020-03-24-1
Posted Mar 25, 2020
Authored by Apple | Site apple.com

Apple Security Advisory 2020-03-24-1 - iOS 13.4 and iPadOS 13.4 are now available and address buffer overflow, code execution, and cross site scripting vulnerabilities.

tags | advisory, overflow, vulnerability, code execution, xss
systems | apple, ios
advisories | CVE-2020-3883, CVE-2020-3885, CVE-2020-3887, CVE-2020-3888, CVE-2020-3890, CVE-2020-3891, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-3909, CVE-2020-3910, CVE-2020-3911, CVE-2020-3913, CVE-2020-3914, CVE-2020-3916, CVE-2020-3917, CVE-2020-3919, CVE-2020-9768, CVE-2020-9770, CVE-2020-9773, CVE-2020-9775, CVE-2020-9777, CVE-2020-9780, CVE-2020-9781
SHA-256 | ed3822d87c71d1ad1f9983b2fb84326bd09f81e911f73a1cf71ee62a59334c75
Android Bluetooth Remote Denial Of Service
Posted Mar 25, 2020
Authored by nu11secur1ty

Android suffers from a bluetooth remote denial of service vulnerability.

tags | exploit, remote, denial of service
advisories | CVE-2020-0022
SHA-256 | 89e5543cb6f51f283e41a489aaa3e084de84be0c84b8090c5910f061d0b501ba
AVAST SecureLine 5.5.522.0 Unquoted Service Path
Posted Mar 25, 2020
Authored by Roberto Pina

AVAST SecureLine version 5.5.522.0 suffers from a SecureLine unquoted service path vulnerability.

tags | exploit
SHA-256 | dca068890885233bfe8e9fb7e3908ce0abd90e84e08c7bcd9e5ffd1a12c62cde
Joomla GMapFP 3.30 Arbitrary File Upload
Posted Mar 25, 2020
Authored by thelastvvv

Joomla GMapFP component version 3.30 suffers from an arbitrary file upload vulnerability.

tags | exploit, arbitrary, file upload
SHA-256 | 8f0e82084a9508b9e75b3daa6af8a23743274a4648760ef5cda5f9df1cf279be
Solving Computer Forensic Case Using Autopsy
Posted Mar 25, 2020
Authored by Qais Hussainy

Whitepaper called Solving Computer Forensic Case Using Autopsy.

tags | paper
SHA-256 | 8505414efdfebe78df426017618f1afbe62dfc50491f045206ab9af6f3950ab9
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close