exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files Date: 2020-04-02

Red Hat Security Advisory 2020-1288-01
Posted Apr 2, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-1288-01 - The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications. Issues addressed include an out of bounds write vulnerability.

tags | advisory, web, tcp
systems | linux, redhat
advisories | CVE-2020-11100
SHA-256 | 89719e6b81441f976dd3381193a1c7ab82863d5a4068e38baa0bcc2c20bca64d
Red Hat Security Advisory 2020-1290-01
Posted Apr 2, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-1290-01 - HAProxy is a TCP/HTTP reverse proxy which is particularly suited for high availability environments. Issues addressed include an out of bounds write vulnerability.

tags | advisory, web, tcp
systems | linux, redhat
advisories | CVE-2020-11100
SHA-256 | 8543e7b94677e15978de5119c6ea1bc027dd4b9630ee58bbf3947abb1242a170
AIDA64 Engineer 6.20.5300 Buffer Overflow
Posted Apr 2, 2020
Authored by Hodorsec

AIDA64 Engineer version 6.20.5300 Report File filename SEH buffer overflow exploit.

tags | exploit, overflow
SHA-256 | fe7db04e0b5015baf2963e005ec2c8ca15943475775055a6ef16d357d909edb1
multiOTP 5.0.4.4 Remote Code Execution
Posted Apr 2, 2020
Authored by Cody Sixteen

This whitepaper documents a walk through that describes the steps taken to identify a remote code execution vulnerability in multiOTP version 5.0.4.4.

tags | exploit, remote, code execution
SHA-256 | 4732ae6117764a5cac9dd84f3d79ef6065f0a8c5a22085a25d924acb3a87756e
MicroStrategy Intelligence Server And Web 10.4 XSS / Disclosure / SSRF / Code Execution
Posted Apr 2, 2020
Authored by redtimmysec | Site redtimmy.com

MicroStrategy Intelligence Server and Web version 10.4 suffers from remote code execution, cross site scripting, server-side request forgery, and information disclosure vulnerabilities.

tags | exploit, remote, web, vulnerability, code execution, xss, info disclosure
advisories | CVE-2020-11450, CVE-2020-11451, CVE-2020-11452, CVE-2020-11453, CVE-2020-11454
SHA-256 | 2e452f25b0aabc3741eb00b4ee2e86d5d200045527146eae962c28cf79d36776
Red Hat Security Advisory 2020-1289-01
Posted Apr 2, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-1289-01 - The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications. Issues addressed include an out of bounds write vulnerability.

tags | advisory, web, tcp
systems | linux, redhat
advisories | CVE-2020-11100
SHA-256 | 43f7dbed2caec40c2917358ab5796636cad13980c6528820ebaf5c8d42ea78dc
Red Hat Security Advisory 2020-1300-01
Posted Apr 2, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-1300-01 - KVM is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include an out of bounds access vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-1711, CVE-2020-7039, CVE-2020-8608
SHA-256 | 3b3c803f11b4c41a45febe8388c0473da3dde22357cdfbf6ed410e72a987fcf3
Red Hat Security Advisory 2020-1296-01
Posted Apr 2, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-1296-01 - KVM is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include an out of bounds access vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-1711, CVE-2020-7039
SHA-256 | 582a06d1a570f22689b6e0e0554844dd019ec443602dd9afc0ae81f7061759a3
Red Hat Security Advisory 2020-1293-01
Posted Apr 2, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-1293-01 - Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Issues addressed include an integer overflow vulnerability.

tags | advisory, overflow, javascript
systems | linux, redhat
advisories | CVE-2020-10531
SHA-256 | df4b1d41f6c68e2a78690577c3494d3339b001d8baf303d5872c25c29dcd6eda
Red Hat Security Advisory 2020-1292-01
Posted Apr 2, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-1292-01 - KVM is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include an out of bounds access vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-8608
SHA-256 | 822a88fbde4ba430ccfe12abfad61ca2fa5862dcf015836281560a4ca8943b73
Ubuntu Security Notice USN-4315-1
Posted Apr 2, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4315-1 - Maximilien Bourgeteau discovered that the Apport lock file was created with insecure permissions. This could allow a local attacker to escalate their privileges via a symlink attack. Maximilien Bourgeteau discovered a race condition in Apport when setting crash report permissions. This could allow a local attacker to read arbitrary files via a symlink attack.

tags | advisory, arbitrary, local
systems | linux, ubuntu
advisories | CVE-2020-8831, CVE-2020-8833
SHA-256 | d819c4efafca8506e3f245fcae9dc7047781ae3500f6f819a3a3741e775ed104
Gentoo Linux Security Advisory 202004-05
Posted Apr 2, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202004-5 - Multiple vulnerabilities have been found in ledger, the worst of which could result in the arbitrary execution of code. Versions less than 3.1.2 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2017-12481, CVE-2017-12482, CVE-2017-2807, CVE-2017-2808
SHA-256 | 92a7a64a66bbe3d36df9adb6bcb9292019eeb3ecf20074f31f1d4a3d1e906355
Gentoo Linux Security Advisory 202004-04
Posted Apr 2, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202004-4 - A heap use-after-free flaw in Qt WebEngine at worst might allow an attacker to execute arbitrary code. Versions less than 5.14.1 are affected.

tags | advisory, arbitrary
systems | linux, gentoo
advisories | CVE-2019-13720
SHA-256 | 7a52b5f7a7774575295d1f209b247ec0dd24851b3a42ade414cb6bdab9a8bd26
Gentoo Linux Security Advisory 202004-03
Posted Apr 2, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202004-3 - Multiple vulnerabilities have been found in GPL Ghostscript, the worst of which could result in the execution of arbitrary code. Versions prior to 9.28_rc4 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2019-10216, CVE-2019-14811, CVE-2019-14812, CVE-2019-14813, CVE-2019-14817, CVE-2019-3835, CVE-2019-3838, CVE-2019-6116
SHA-256 | 1143a341a653ea77288aa928bf02cfdaeea19658c1e0c96e22d25a3ee29e8a6e
Gentoo Linux Security Advisory 202004-02
Posted Apr 2, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202004-2 - Multiple vulnerabilities have been found in VirtualBox, the worst of which could allow an attacker to take control of VirtualBox. Versions prior to 6.1.2 are affected.

tags | advisory, vulnerability
systems | linux, gentoo
advisories | CVE-2019-2926, CVE-2019-2944, CVE-2019-2984, CVE-2019-3002, CVE-2019-3005, CVE-2019-3017, CVE-2019-3021, CVE-2019-3026, CVE-2019-3028, CVE-2019-3031, CVE-2020-2674, CVE-2020-2678, CVE-2020-2681, CVE-2020-2682, CVE-2020-2689, CVE-2020-2690, CVE-2020-2691, CVE-2020-2692, CVE-2020-2693, CVE-2020-2698, CVE-2020-2702, CVE-2020-2703, CVE-2020-2704, CVE-2020-2705, CVE-2020-2725, CVE-2020-2726, CVE-2020-2727
SHA-256 | 9444c1cd65b0be3c66e10b50cd77081241f0982f0a67c43be5b83173de7238a9
Gentoo Linux Security Advisory 202004-01
Posted Apr 2, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202004-1 - A vulnerability in HAProxy might lead to remote execution of arbitrary code. Versions less than 2.0.10 are affected.

tags | advisory, remote, arbitrary
systems | linux, gentoo
advisories | CVE-2019-19330
SHA-256 | fc7defad053a9d4d11667ab4c57e7a8e20e74a8eaf920d8e84d6936959d5dc30
Red Hat Security Advisory 2020-0933-01
Posted Apr 2, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0933-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a memory exhaustion vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-8552
SHA-256 | 977d069952fad168f2f02b273232651c897dafbc1e28809a0b4c7ba3b688b95d
Red Hat Security Advisory 2020-0934-01
Posted Apr 2, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0934-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a use-after-free vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-8945
SHA-256 | ecfb54ae160def1b02693ff1eff80d1e6c5eba5018a485d375c916b96d05c808
Oracle Coherence Fusion Middleware Remote Code Execution
Posted Apr 2, 2020
Authored by nu11secur1ty, Ventsislav Varbanovski

Oracle Coherence Fusion Middleware remote code execution exploit. Supported versions that are affected are 3.7.1.17, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0.

tags | exploit, remote, code execution
advisories | CVE-2020-2555
SHA-256 | 52dafdcd1d80de582519836e110883d5cb715ba29d27f9d1567b0b73106f9194
DiskBoss 7.7.14 Local Buffer Overflow
Posted Apr 2, 2020
Authored by Paras Bhatia

DiskBoss version 7.7.14 Input Directory local buffer overflow proof of concept exploit.

tags | exploit, overflow, local, proof of concept
SHA-256 | dccb7a29e4c3e003b3266f00e22e3712dd77ee73209caf9c41569d4536228b05
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close