exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2020-09-10

Kernel Live Patch Security Notice LSN-0071-1
Posted Sep 10, 2020
Authored by Benjamin M. Romer

A security issue was fixed in the 4.15 kernel. This issue affects the 5.4 kernel as well, but a livepatch is not yet available. While work is continuing to develop livepatches for all affected kernels, due to the severity of the issue, they are releasing patches as they become ready. Or Cohen discovered that the AF_PACKET implementation in the Linux kernel did not properly perform bounds checking in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.

tags | advisory, denial of service, arbitrary, kernel, local
systems | linux
advisories | CVE-2020-14386
SHA-256 | a13ec104389455bc48ad854bb63cf714af2cc7fd1932c7dc38c32db57bf0e5c6
Mobile Shop System 1.0 SQL Injection
Posted Sep 10, 2020
Authored by Moaaz Taha

Mobile Shop System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 2cc69bdfefad255d949a9b6e712e5795c817d2f76d3c9909e8385fbee825629d
ZTE F602W CAPTCHA Bypass
Posted Sep 10, 2020
Authored by Hritik Vijay

The ZTE F602W router suffers from a CAPTCHA bypass vulnerability.

tags | exploit, bypass
advisories | CVE-2020-6862
SHA-256 | d415cdf47406b19582ff80faa7fa04887c852fb59dd457fd1341d4fd6f1226cb
Tiandy IPC / NVR 9.12.7 Credential Disclosure
Posted Sep 10, 2020
Authored by zb3

Tiandy IPC and NVR version 9.12.7 suffer from a credential disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | 9c7fcb1c91907d757626bd72183d93954fd6dd746048d7043f2f74b410b41822
CuteNews 2.1.2 Remote Code Execution
Posted Sep 10, 2020
Authored by Musyoka Ian

CuteNews version 2.1.2 remote code execution exploit.

tags | exploit, remote, code execution
advisories | CVE-2019-11447
SHA-256 | d220768cceb26827a8dabeb01a7df4046a753b0e28e0c60cba3f86088e976bd3
Zeek 3.2.1
Posted Sep 10, 2020
Authored by Robin Sommer, Vern Paxson | Site zeek.org

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.

Changes: A security issue along with multiple bugs were addressed.
tags | tool, intrusion detection
systems | unix
SHA-256 | 1ebcc73815b00df7b7f578d34cd0278030857b6c082aaff416016b00d3d1cb67
IlchCMS 2.1.37 Cross Site Scripting
Posted Sep 10, 2020
Authored by Daniel Bishtawi | Site netsparker.com

IlchCMS version 2.1.37 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 2a0761c84501dac4be159617b4b68553d1c32bb9748ab241264005348354dca5
Red Hat Security Advisory 2020-3723-01
Posted Sep 10, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3723-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 85.0.4183.83. Issues addressed include information leakage, integer overflow, and use-after-free vulnerabilities.

tags | advisory, web, overflow, vulnerability
systems | linux, redhat
advisories | CVE-2020-6559, CVE-2020-6560, CVE-2020-6561, CVE-2020-6562, CVE-2020-6563, CVE-2020-6564, CVE-2020-6565, CVE-2020-6566, CVE-2020-6567, CVE-2020-6568, CVE-2020-6569, CVE-2020-6570, CVE-2020-6571
SHA-256 | 05288c4771f7a5e29002f87f353b69d5eb2d3b160f9d09e944472ba4a79e90df
Red Hat Security Advisory 2020-3714-01
Posted Sep 10, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3714-01 - The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.

tags | advisory, web
systems | linux, redhat
advisories | CVE-2020-9490
SHA-256 | 86eb5d9be570e43489fb5f9e58f36b226905a33ab8864399ec6474723ed18e0e
Red Hat Security Advisory 2020-3713-01
Posted Sep 10, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3713-01 - Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. Issues addressed include a resource exhaustion vulnerability.

tags | advisory, imap
systems | linux, redhat, unix
advisories | CVE-2020-12100, CVE-2020-12673, CVE-2020-12674
SHA-256 | fb59fad9d07e625d5f38b44bf743d2a63224244c690ddb5fc7e29a99b4d2b051
Red Hat Security Advisory 2020-3711-01
Posted Sep 10, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3711-01 - OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-17376
SHA-256 | a7913bea70a7ad2599540b6baeb5db433f888515c9be897e899fea9f25382f44
Red Hat Security Advisory 2020-3708-01
Posted Sep 10, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3708-01 - OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-17376
SHA-256 | e71f850bf31d4a3392abd4a785c18b8e5c87026f00dc2c19ff80595ddc381c9d
Red Hat Security Advisory 2020-3706-01
Posted Sep 10, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3706-01 - OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-17376
SHA-256 | 9ae84ecbb92bcdf4bb8792dd3e49cba6403992ffee34a1869485ccc10d5db3c5
Red Hat Security Advisory 2020-3704-01
Posted Sep 10, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3704-01 - OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-17376
SHA-256 | bc91e62b6baec7aa726e4eb3333dc4be943913148a8453451cbd6094e3100894
Red Hat Security Advisory 2020-3702-01
Posted Sep 10, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3702-01 - OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-17376
SHA-256 | ea1c843bf1aa46c02dc0ad69647add6bcff29c84f01569e891baa41111d070cd
Gentoo Linux Security Advisory 202009-03
Posted Sep 10, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202009-3 - Multiple vulnerabilities have been found in Chromium and Google Chrome, the worst of which could result in the arbitrary execution of code. Versions less than 85.0.4183.102 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2020-15959, CVE-2020-6573, CVE-2020-6575, CVE-2020-6576
SHA-256 | 315778c2a3631023e6e8f5408b132e382b52a5c472a2469723262170ede429ba
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close