exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 25 RSS Feed

Files Date: 2020-09-14

Joomla! paGO Commerce 2.5.9.0 SQL Injection
Posted Sep 14, 2020
Authored by Mehmet Kelepce

Joomla! paGO Commerce component 2.5.9.0 suffers from an authenticated remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 58ceab5562797d6b967ac66141e43db5cdabc1f3c98eadb0bb21aaaf91af8e1b
Pearson Vue VTS 2.3.1911 Unquoted Service Path
Posted Sep 14, 2020
Authored by JOK3R

The installer in Pearson Vue VTS version 2.3.1911 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | 8d69676c6a56874900fc03d2fddce557df70082f3f05fe551362c8a96d8914eb
RAD SecFlow-1v SF_0290_2.3.01.26 Cross Site Request Forgery
Posted Sep 14, 2020
Authored by Uriel Yochpaz, Jonatan Schor

RAD SecFlow-1v version SF_0290_2.3.01.26 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 59ad1953c92da71577c3397940adce84d66e5d47937f0c73078f5237c408f22e
Rapid7 Nexpose Installer 6.6.39 Unquoted Service Path
Posted Sep 14, 2020
Authored by Angelo D'Amato

Rapid7 Nexpose Installer version 6.6.39 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | 5d9a132831c793f97e6f98c48c4ddd236296fa6bc282eeaa13dab5d2ed037285
RAD SecFlow-1v SF_0290_2.3.01.26 Cross Site Scripting
Posted Sep 14, 2020
Authored by Uriel Yochpaz, Jonatan Schor

RAD SecFlow-1v version SF_0290_2.3.01.26 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | cd288681cc3954ca39acf8ec337f5466429e5d200b04237bcb97de0fae060472
Red Hat Security Advisory 2020-3740-01
Posted Sep 14, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3740-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 85.0.4183.102. Issues addressed include a use-after-free vulnerability.

tags | advisory, web
systems | linux, redhat
advisories | CVE-2020-15959, CVE-2020-6573, CVE-2020-6574, CVE-2020-6575, CVE-2020-6576
SHA-256 | 13c377fa77f3e042980371957cf44af74f245534b3938fd91286abad552a2fd6
Clam AntiVirus Toolkit 0.103.0
Posted Sep 14, 2020
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: Clamd can now reload the signature database without blocking scanning. Many additional notable changes and bug fixes.
tags | tool, virus
systems | unix
SHA-256 | 32a9745277bfdda80e77ac9ca2f5990897418e9416880f3c31553ca673e80546
Linux expand_downwards() / munmap() Race Condition
Posted Sep 14, 2020
Authored by Jann Horn, Google Security Research

A race condition exists with munmap() downgrades in Linux kernel versions since 4.20.

tags | exploit, kernel
systems | linux
SHA-256 | 12c19d8bb64bc07c6c91f0dc616830116f9cf648c2c843890b7c779c318ceed4
Microsoft Windows Finger Security Bypass / C2 Channel
Posted Sep 14, 2020
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft Windows TCPIP Finger Command finger.exe that ships with the OS, can be used as a file downloader and makeshift C2 channel. Legitimate use of Windows Finger Command is to send Finger Protocol queries to remote Finger daemons to retrieve user information. However, the finger client can also save the remote server response to disk using the command line redirection operator.

tags | exploit, remote, protocol
systems | windows
SHA-256 | 3babc6b7fe4a8f47b91663b7687243b54fb3e6f50d737c19a25a59347d22cb67
Red Hat Security Advisory 2020-3732-01
Posted Sep 14, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3732-01 - MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries.

tags | advisory
systems | linux, redhat
advisories | CVE-2019-2911, CVE-2019-2914, CVE-2019-2938, CVE-2019-2946, CVE-2019-2957, CVE-2019-2960, CVE-2019-2963, CVE-2019-2966, CVE-2019-2967, CVE-2019-2968, CVE-2019-2974, CVE-2019-2982, CVE-2019-2991, CVE-2019-2993, CVE-2019-2997, CVE-2019-2998, CVE-2019-3004, CVE-2019-3009, CVE-2019-3011, CVE-2019-3018, CVE-2020-14539, CVE-2020-14540, CVE-2020-14547, CVE-2020-14550, CVE-2020-14553, CVE-2020-14559, CVE-2020-14567, CVE-2020-14568
SHA-256 | e5b5ea486795d781f15f8798897a82f2f48644e8f267016d7403cf8dce566612
Red Hat Security Advisory 2020-3733-01
Posted Sep 14, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3733-01 - The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.

tags | advisory, web
systems | linux, redhat
advisories | CVE-2020-9490
SHA-256 | c784020be994af78d251c9b32891c8cb0b18fa0ca188306ecf70bb5e0c93e9f3
Red Hat Security Advisory 2020-3736-01
Posted Sep 14, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3736-01 - Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. Issues addressed include a resource exhaustion vulnerability.

tags | advisory, imap
systems | linux, redhat, unix
advisories | CVE-2020-12100, CVE-2020-12673, CVE-2020-12674
SHA-256 | f2f761dd7dde49bfd4aa597adb004d01505647c371efea19e6e4504615a4b0aa
Red Hat Security Advisory 2020-3735-01
Posted Sep 14, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3735-01 - Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. Issues addressed include a resource exhaustion vulnerability.

tags | advisory, imap
systems | linux, redhat, unix
advisories | CVE-2020-12100, CVE-2020-12673, CVE-2020-12674
SHA-256 | dd5369db54a4b97a48e0ec79ac558ed78b8cc59d447c2e0929f168ab5654f573
Red Hat Security Advisory 2020-3734-01
Posted Sep 14, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3734-01 - The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.

tags | advisory, web
systems | linux, redhat
advisories | CVE-2020-9490
SHA-256 | 5d288f1db5355a0510fc810bff40eb35272db5d89bd652ec58960da0c6fdf937
Red Hat Security Advisory 2020-3730-01
Posted Sep 14, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3730-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.23 includes bug fixes and enhancements, which are documented in the Release Notes document listed in the References section. Issues addressed include a denial of service vulnerability.

tags | advisory, java, denial of service
systems | linux, redhat
advisories | CVE-2020-14384
SHA-256 | 6ecd57b5d8de316801db88ebc38b9230dc0f9808bb0c6d79e8eb317286a8e937
Red Hat Security Advisory 2020-3731-01
Posted Sep 14, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3731-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This asynchronous patch is an update for JBoss Enterprise Application Platform 6.4. All users of Red Hat JBoss Enterprise Application Platform 6.4 are advised to upgrade to these updated packages. Issues addressed include a denial of service vulnerability.

tags | advisory, java, denial of service
systems | linux, redhat
advisories | CVE-2020-14384
SHA-256 | 42fa0db9583d194a8897e3d2ab7528ac6add524c9285c136203f4a630f7386b0
Gentoo Linux Security Advisory 202009-12
Posted Sep 14, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202009-12 - A vulnerability in ZeroMQ could lead to a Denial of Service condition. Versions less than 4.3.3 are affected.

tags | advisory, denial of service
systems | linux, gentoo
advisories | CVE-2020-15166
SHA-256 | b320f797f1d3fca11394a13c7820e148ec210cbf57d10fb0795cc282035ed638
Gentoo Linux Security Advisory 202009-11
Posted Sep 14, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202009-11 - A vulnerability in ProFTPD could lead to a Denial of Service condition. Versions less than 1.3.7a are affected.

tags | advisory, denial of service
systems | linux, gentoo
SHA-256 | 381639f70de622f5c45e53efd77e065509f6c99ca0562a62f5cf4e0a533e560b
Gentoo Linux Security Advisory 202009-10
Posted Sep 14, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202009-10 - A vulnerabilities in PHP could lead to a Denial of Service condition. Versions less than 7.2.33:7.2 are affected.

tags | advisory, denial of service, php, vulnerability
systems | linux, gentoo
advisories | CVE-2020-7068
SHA-256 | 9133a27eebb95c5a4341ac0e361535f9f714ac1a4b676594f329367dcc72fe6d
Gentoo Linux Security Advisory 202009-09
Posted Sep 14, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202009-9 - Multiple vulnerabilities have been found in Nextcloud Desktop Sync client, the worst of which may allow execution of arbitrary code. Versions less than 2.6.5 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2020-8189, CVE-2020-8224, CVE-2020-8227
SHA-256 | bd3b6b4c619aad8b5810fc3abb8eef88dd87f4255c132dbd9ca1579e8685c2e2
Gentoo Linux Security Advisory 202009-08
Posted Sep 14, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202009-8 - An information disclosure vulnerability in GNOME Shell might allow local attackers to obtain sensitive information. Versions less than 3.34.5-r1 are affected.

tags | advisory, shell, local, info disclosure
systems | linux, gentoo
advisories | CVE-2020-17489
SHA-256 | da439270101b549eda641b2c3633ee536c8b12b027216bc118e37befb0dbb92c
Gentoo Linux Security Advisory 202009-07
Posted Sep 14, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202009-7 - Multiple vulnerabilities have been found in the Perl module DBI, the worst of which could result in a Denial of Service condition. Versions less than 1.643.0 are affected.

tags | advisory, denial of service, perl, vulnerability
systems | linux, gentoo
advisories | CVE-2020-14392, CVE-2020-14393
SHA-256 | 714fd4e5546d66856831852702aa1b8705e5ba7c128e348b119b5891053f375a
Gentoo Linux Security Advisory 202009-06
Posted Sep 14, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202009-6 - A vulnerability in GNOME File Roller could lead to a directory traversal attack. Versions less than 3.36.3 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2020-11736
SHA-256 | 9da03b2ec5614ac9e8979b454a74b8533a850b28e1a247709ed01cbf555aceb0
Gentoo Linux Security Advisory 202009-05
Posted Sep 14, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202009-5 - A vulnerability in GStreamer RTSP Server could lead to a Denial of Service condition. Versions less than 1.16.2 are affected.

tags | advisory, denial of service
systems | linux, gentoo
advisories | CVE-2020-6095
SHA-256 | 6df5dd32dae0f2108e2db0fbef8ffa710b59ba2d8ea3106320c4a139b775b002
Gentoo Linux Security Advisory 202009-04
Posted Sep 14, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202009-4 - Qt GUI has a buffer overflow with unspecified impact. Versions less than 5.14.2-r1 are affected.

tags | advisory, overflow
systems | linux, gentoo
advisories | CVE-2020-17507
SHA-256 | 7e2112d4897be82740ca6df5a88e1b96a58ff3938393ad64ccb3b88206978b77
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close